![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
Overview
![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
This course covers the following learning outcomes and goals: understanding the prevalence of memory safety vulnerabilities, evaluating the effectiveness of strategies and technologies to combat these vulnerabilities, and exploring future developments in preventing memory corruption exploitation.
The course teaches individual skills and tools such as Defense-In-Depth strategies including Bug Minimization, Exploit Mitigations, and Isolation, as well as cost considerations in terms of Discovery and Development costs.
The teaching method of the course includes a presentation style with real-world examples such as Browser Exploit Walkthroughs from 2009 and 2015.
The intended audience for this course includes cybersecurity professionals, software developers, IT security specialists, and anyone interested in understanding and preventing memory safety vulnerabilities and exploitation techniques.
Syllabus
Introduction
What will we cover?
Applicability
Defense-In-Depth - A three-tiered approach
Defense-In-Depth - Bug Minimization
Defense-In-Depth - Exploit Mitigations
Defense-In-Depth - Isolation
Let's talk about cost - Discovery cost
Browser Exploit Walkthrough 2009 (UAF)
Browser Exploit Walkthrough 2015 (UAF) - Core Security (IE11) MS15-106
Let's talk about cost - Development cost
The Future
Taught by
Kaspersky