RCCE Course
Course #1009

Exploit Development and Buffer Overflows

📊 Level: Advanced
⏱️ Duration: 2 Days
🏷️ Track: Penetration Testing
📋 Prerequisites: Foundations
🖥️ Mode: Online Instructor-Led
📝 Course Description

RCCE students will learn low-level memory corruption vulnerabilities and shellcode writing. RCCE students will learn to apply industry-standard tools and techniques to identify weaknesses and verify security controls. The course covers practical scenarios ranging from initial setup to final reporting. RCCE students will learn to analyze complex systems and think like an attacker to better defend the organization. This comprehensive course delivers practical knowledge applicable to real-world cybersecurity operations. Starting from foundational concepts, RCCE students will learn through a combination of concept explanation, practical demonstration, and hands-on exercises.

🎯 Target Audience
  • Security Engineers building defensive controls
  • Security Analysts and Blue Team members
  • Systems Administrators with security responsibilities
  • GRC and Risk Professionals supporting controls
  • Professionals implementing Exploit Development and Buffer Overflows
🧠 What You Will Learn
  • Execute hands-on tasks for penetration testing
  • Execute hands-on tasks for exploit development
  • Execute hands-on tasks for memory corruption, shellcode development & exploitation techniques
  • Explain ● Foundations Track fundamentals
  • Execute hands-on tasks for ● penetration testing domain
  • Explain Course Overview: Exploit Development & Buffer Overflows fundamentals
  • Execute hands-on tasks for what you will learn
  • Design a scalable privilege management architecture with policy and enforcement
  • Execute hands-on tasks for kernel space
  • Execute hands-on tasks for stack frame anatomy
  • Execute hands-on tasks for key exploit targets
  • Execute hands-on tasks for function arguments
📚 Course Outline
Module 01Penetration Testing
Module 02Exploit Development
Module 03Memory Corruption, Shellcode Development & Exploitation Techniques
Module 04● Foundations Track
Module 05● Penetration Testing Domain
Module 06Course Overview: Exploit Development & Buffer Overflows
Module 07What You Will Learn
Module 08Memory Architecture Fundamentals
Module 09Kernel Space
Module 10Stack Frame Anatomy
Module 11Key Exploit Targets
Module 12Function Arguments
Module 13Local Variables / Buffer
Module 14Introduction to Buffer Overflows
🧪 Lab Details

All hands-on labs run on Rocheston Rose X OS. Students practice exploit development and buffer overflows by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.

  • Lab 1: Execute hands-on tasks for penetration testing
  • Lab 2: Execute hands-on tasks for exploit development
  • Lab 3: Execute hands-on tasks for memory corruption, shellcode development & exploitation techniques
  • Lab 4: Explain ● Foundations Track fundamentals
  • Lab 5: Execute hands-on tasks for ● penetration testing domain
📊 Skill Level
Advanced
Beginner Intermediate Advanced Expert
Duration
2 Days
🎓
Certificate
Completion
🖥️
Lab Platform
Rose X OS
👨‍🏫
Mode of Training
Online Instructor-Led
🔥
Platform
Zelfire
🐦‍⬛
Cyber Range
Raven
📓
Study Material
CyberNotes
🏆 Certificate

Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Exploit Development and Buffer Overflows, verifiable through the Rocheston certification portal.

🔑 Student Access & Materials
  • Full access to all course materials and slide decks
  • Hands-on lab access on Rocheston Rose X OS environment
  • Access to Rocheston CyberNotes
  • Access to Rocheston Zelfire — EDR/XDR SIEM platform
  • Access to Rocheston Raven — online cyber range exercise platform
  • Access to Rocheston Vulnerability Vines AI