Penetration Testing and Vulnerability Analysis
security 2011. 12. 6. 16:39Course Overview
This is the course website for Penetration Testing and Vulnerability Analysis currently taught at the Polytechnic Institute of New York University. This course introduces the fundamental technical skills required to identify, analyze, and exploit software vulnerabilities. Taught by a team of security industry experts, we cover the following topics:
- Introduction to Penetration Testing, taught by Dan Guido
Where the industry is now, where it's going, and how these skills fit in
- Operational Reviews and Code Audits, taught by Brandon Edwards
Identify vulnerabilities and programmer errors by auditing source code
- Reverse Engineering, taught by Alex Sotirov and Aaron Portnoy
Understand, modify, and analyze compiled applications and systems to identify vulnerabilities
- Exploitation, taught by Dino Dai Zovi
Take advantage of vulnerabilities to gain access to restricted data and break security policies
- Web Hacking, taught by Joe Hemler and Marcin Wielgoszewski
Vulnerability discovery and exploitation on the web
- Network Pentests: Post exploitation, persistence and exfiltration, taught by Colin Ames
Expanding access, maintaining persistence, and evading detection
The course and this website have been organized and maintained for the past four years by Dan Guido. You can read more about the history of the course and some of the past work that students have created. If you would like to take this course for credit, it is offered through:
- E-Poly's Cyber-Security certificate,
- E-Poly's MS in Cyber-Security,
- and through the university proper.
For outside users, there is a reddit study group as well as a twitter that helps you keep up with new course material and other announcements regarding the class.
'security' 카테고리의 다른 글
NIST publishes 50kish vulnerable code samples in Java/C/C++ (1) | 2011.12.06 |
---|---|
RFC (0) | 2011.10.06 |
warGame site (0) | 2010.08.31 |
wifi/wlan password (0) | 2010.06.12 |
wireshark - (0) | 2010.06.11 |