top of page
Course length (in hours):
40
Vulnerability Discovery and Exploitation
Course Description
After completing this course, students will have the practical skills required to assess embedded programs for vulnerabilities, recommend mitigations, and create proof-of-concept exploits to demonstrate those vulnerabilities to commanders.
bottom of page