General beginners to the field or those looking to transition into Offensive Security with a focus on Windows platforms.
This is a foundational-level course intended to be a complete curriculum for obtaining practical and modern experience across various areas of Offensive Security, including common topics in specializations like Red-Team Operations and Reverse Engineering. This course will develop student capabilities to perform in roles across red teaming and reverse engineering jobs.
This course assumes little to no prior experience, with relevancy for students, interns, juniors, other IT-related disciplines, blue-teams and related defense teams (incl. threat intel) and various other backgrounds that may not have extensive existing Offensive Security knowledge.
This contrasts with our advanced courses that may build from existing foundational knowledge and experience.
Students that complete this course will have working knowledge of modern techniques and practical experience across Reverse Engineering and Offensive Red-Team Ops. This includes up-to-date and real-world experience tackling challenges and utilizing skills exercised by modern practitioners in the related specializations.
The ultimate goal of this course is to rapidly uplift students’ competencies in the aforementioned offensive security specializations into a level appropriate for professional workplace use or for pivoting into advanced research.
A systematic and complete curriculum covering the foundations of Offensive Security.
Includes competency development in topics of Red Team Operations and Reverse Engineering.
Each module contains extensive hands-on challenges and walkthroughs based on real environments, software targets and modern techniques.
Christopher Vella has extensive experience with vulnerability research and has found vulnerabilities in a range of high-profile software (Hyper-V Hypervisor, Adobe PDF, Windows OS & Kernel). Public vulnerabilities discovered by Christopher include (CVE-2020-17414, CVE-2020-24559, CVE-2021-25250, CVE-2020-24557, CVE-2020-24556, CVE-2020-24558, + more) alongside multiple non-public vulnerabilities.