Exploit Development and Buffer Overflows
RCCE students will learn low-level memory corruption vulnerabilities and shellcode writing. RCCE students will learn to apply industry-standard tools and techniques to identify weaknesses and verify security controls. The course covers practical scenarios ranging from initial setup to final reporting. RCCE students will learn to analyze complex systems and think like an attacker to better defend the organization. This comprehensive course delivers practical knowledge applicable to real-world cybersecurity operations. Starting from foundational concepts, RCCE students will learn through a combination of concept explanation, practical demonstration, and hands-on exercises.
- Security Engineers building defensive controls
- Security Analysts and Blue Team members
- Systems Administrators with security responsibilities
- GRC and Risk Professionals supporting controls
- Professionals implementing Exploit Development and Buffer Overflows
- Execute hands-on tasks for penetration testing
- Execute hands-on tasks for exploit development
- Execute hands-on tasks for memory corruption, shellcode development & exploitation techniques
- Explain ● Foundations Track fundamentals
- Execute hands-on tasks for ● penetration testing domain
- Explain Course Overview: Exploit Development & Buffer Overflows fundamentals
- Execute hands-on tasks for what you will learn
- Design a scalable privilege management architecture with policy and enforcement
- Execute hands-on tasks for kernel space
- Execute hands-on tasks for stack frame anatomy
- Execute hands-on tasks for key exploit targets
- Execute hands-on tasks for function arguments
| Module 01 | Penetration Testing |
| Module 02 | Exploit Development |
| Module 03 | Memory Corruption, Shellcode Development & Exploitation Techniques |
| Module 04 | ● Foundations Track |
| Module 05 | ● Penetration Testing Domain |
| Module 06 | Course Overview: Exploit Development & Buffer Overflows |
| Module 07 | What You Will Learn |
| Module 08 | Memory Architecture Fundamentals |
| Module 09 | Kernel Space |
| Module 10 | Stack Frame Anatomy |
| Module 11 | Key Exploit Targets |
| Module 12 | Function Arguments |
| Module 13 | Local Variables / Buffer |
| Module 14 | Introduction to Buffer Overflows |
All hands-on labs run on Rocheston Rose X OS. Students practice exploit development and buffer overflows by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.
- Lab 1: Execute hands-on tasks for penetration testing
- Lab 2: Execute hands-on tasks for exploit development
- Lab 3: Execute hands-on tasks for memory corruption, shellcode development & exploitation techniques
- Lab 4: Explain ● Foundations Track fundamentals
- Lab 5: Execute hands-on tasks for ● penetration testing domain
Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Exploit Development and Buffer Overflows, verifiable through the Rocheston certification portal.
- Full access to all course materials and slide decks
- Hands-on lab access on Rocheston Rose X OS environment
- Access to Rocheston CyberNotes
- Access to Rocheston Zelfire — EDR/XDR SIEM platform
- Access to Rocheston Raven — online cyber range exercise platform
- Access to Rocheston Vulnerability Vines AI