EC-Council CAST - Exploit Development Overdrive - Only 3 Days

Seven reasons why you should sit your CAST EDO course with Firebrand Training

Find Out How We Help You To Learn New Skills Quickly

  1. You’ll be CAST EDO certified in just 3 days. With us, you’ll be CAST EDO trained in record time
  2. Our CAST EDO course is all-inclusive. A one-off fee covers all course materials, accommodation and meals. No hidden extras
  3. Pass CAST EDO first time or train again for free. This is our guarantee. We're sure you'll pass your CAST EDO course first time. But if you don’t, come back within a year, and only pay for accommodation. Everything else is free
  4. You’ll learn more CAST EDO. A day with a traditional training provider generally runs from 9am – 5pm, with a nice long break for lunch. With Firebrand Training you’ll get at least 12 hours/day quality learning time, with your instructor
  5. You’ll learn CAST EDO faster. Chances are, you’ll have a different learning style to those around you. We combine visual, auditory and tactile styles to deliver the material in a way that ensures you will learn faster and more easily
  6. You’ll be studying CAST EDO with the best. We have won the Institute of IT Training’s "Training Company of the Year" a record three times. As well as winning many more awards, we’ve trained and certified 30,000 professionals, and we’re partners with all of the big names in the business
  7. You'll do more than study CAST EDO courseware. We use labs, case studies and practice tests to make sure you can apply your new knowledge to the work environment. Our instructors use demonstrations and real-world experience to keep the day interesting and engaging

Think you are ready for the course? Take a FREE practice test to assess your knowledge!

When do you want to sit your accelerated course?

Start

Finish

Status

Location

Book now

24/2/2014 (Monday)

26/2/2014 (Wednesday)

Finished

-

 

30/6/2014 (Monday)

2/7/2014 (Wednesday)

Wait list

Nationwide

 

11/8/2014 (Monday)

13/8/2014 (Wednesday)

Limited availability

Nationwide

 

22/9/2014 (Monday)

24/9/2014 (Wednesday)

Open

Nationwide

 

3/11/2014 (Monday)

5/11/2014 (Wednesday)

Open

Nationwide

 

15/12/2014 (Monday)

17/12/2014 (Wednesday)

Open

Nationwide

 

Here's the Firebrand Training review section. We've trained more than 35,000 students in twelve years and asked them all to review our Accelerated Learning. Currently, 96.22% have said Firebrand exceeded their expectations:



"I really enjoy the Firebrand training format. The trainer was passionate and knowledgeable about the material he was teaching."
Arjen Post. - EC-Council Certified Ethical Hacker (CEH v8) (5 days) (8/7/2013 to 12/7/2013)

"The CEHv8 Firebrand Training was very, very good. Five days non-stop training by an excellent teacher with loads of experience."
Robert Jan van der Burght, Kadaster. - EC-Council Certified Ethical Hacker (CEH v8) (5 days) (8/7/2013 to 12/7/2013)

"If you want to test your IT and TI skills for becoming a security specialist this is the way to start. Be prepared to get on a technical challenging rollercoaster and get inspired with new ideas."
Ronald van Dorp, KPN. - EC-Council Certified Ethical Hacker (CEH v8) (5 days) (15/10/2012 to 19/10/2012)

"The CEHv7 training was lot of fun! Nice hacking and lost of study materials I like it this way!!"
Maurice Janmaat, Ordina. - EC-Council Certified Ethical Hacker (CEH v8) (5 days) (15/10/2012 to 19/10/2012)

"Fine, quick and accurate instructor with very up to date knowledge. Training facilities are fine: small room, good food, nice surroundings."
N.B. - EC-Council Certified Ethical Hacker (CEH v8) (5 days) (8/10/2012 to 12/10/2012)

"I have done many courses at many centres but Firebrand training is awesome. I have learnt the course in a very easy way due to my instructor. Thanks Firebrand"
Moazzam Bhuiyan, Zamir Telecom Limited. - EC-Council Certified Ethical Hacker (CEH v8) (5 days) (17/2/2014 to 21/2/2014)

"Like Nike says, "Just do it"!"
Anonymous - EC-Council Certified Ethical Hacker (CEH v8) (5 days) (3/2/2014 to 7/2/2014)

"Excellent week, time well spent."
damion parry, fubra. - EC-Council Certified Ethical Hacker (CEH v8) (5 days) (20/1/2014 to 24/1/2014)

"Excellent logistics and trainer"
Thomas Mullen, Telefonica. - EC-Council Certified Ethical Hacker (CEH v8) (5 days) (20/1/2014 to 24/1/2014)

"Very Professional, great facilities and enjoyable environment to conduct training."
Jonathon Keiller. - EC-Council Certified Ethical Hacker (CEH v8) (5 days) (20/1/2014 to 24/1/2014)

The EC-Council Centre of Advanced Security Training has arrived at Firebrand Training. On this intensive three-day Exploit Development Overdrive course, you will learn how to write your own application exploits.

Warning: This is not a beginner’s course. It's highly-technical, with many hands-on labs. The course is right for you if you're an: experienced security professional, penetration tester, researcher or application developer.

You will learn how to:

  • Write your own exploits from scratch
  • Discover new vulnerabilities in applications
  • Use Metasploit as an exploit development framework
  • Exploit stack and heap overflows on both Linux and Windows
  • Bypass memory protection measures like DEP, ASLR, and Stack Canaries
  • Write your own shellcode on both Linux and Windows
  • Write stack- and heap-based buffer overflow exploits in both Perl and Python
  • Use debuggers like GDB, Ollydbg, and WinDebug

Note: this course doesn't include an exam, but you'll become Exploit Development Overdrive certified.

Accredited Training Centre of the Year

Accredited Training Centre of the Year

Firebrand Training has again won the EC-Council Accredited Training Centre of the Year Award, from a Training Partner network that has more than 450 training centres across 70 countries.

Jay Bavisi, President of EC-Council said: “The annual EC-Council Awards highlights the commitment and achievements of our global partners and trainers that have contributed to the information security community.”

Read more ...

Interested? See prices or call 024-8457770

Other accelerated training providers rely heavily on lecture and independent self-testing and study.

Effective technical instruction must be highly varied and interactive to keep attention levels high, promote camaraderie and teamwork between the students and instructor, and solidify knowledge through hands-on learning.

Firebrand Training provides instruction to meet every learning need:

  • Intensive group instruction
  • One-on-one instruction attention
  • Hands-on labs
  • Lab partner and group exercises
  • Question and answer drills
  • Independent study

This information has been provided as a helpful tool for candidates considering training. Courses that include certification come with a certification guarantee. Pass first time or train again for free (just pay for accommodation and exams on your return). We do not make any guarantees about personal successes or benefits of obtaining certification. Benefits of certification determined through studies do not guarantee any particular personal successes.

Read more ...

Interested? See prices or call 024-8457770

Module 1: The Exploit Development Process

  • Exploit methodology
  • Fault injection
  • Fuzzers
  • Tools of the trade

Module 2: Introduction to Assembly

  • Linux assembly
  • Windows assembly
  • Writing and debugging assembly programs

Module 3: Writing Shellcode

  • Linux shellcode
  • Windows shellcode

Module 4: Stack-Based Buffer Overflows

  • Memory architecture
  • Fault injection
  • Ollydbg
  • WinDebug
  • Gdb
  • Metasploit tools
  • Writing stack-based overflows for Linux
  • Writing stack-based overflows for Windows

Module 5: SEH Exploits

  • Structured Exception Handling
  • SafeSEH Bypass
  • Writing SEH exploits

Module 6: Advanced Buffer Overflows

  • Bypassing DEP
  • Bypassing ASLR
  • Stack Cookies
  • Egg Hunter Shellcode

Module 7: Heap Overflows

  • Heap architecture
  • Writing heap overflows

Module 8: Advanced Metasploit Framework

  • Writing exploits for Metasploit
  • Advanced Meterpreter

Module 9: Format String Attacks

  • Writing format string attacks

Read more ...

Interested? See prices or call 024-8457770

Official EC-Council Courseware

  • CAST 616 - Exploit Development Overdrive

Firebrand Training offers top-quality technical education and certification training in an all-inclusive course package specifically designed for the needs and ease of our students. We attend to every detail so our students can focus solely on their studies and certification goals.

Our Certification Programmes include:

  • Intensive Hands-on Training Utilising our (Lecture | Lab | Review)TM Delivery
  • Comprehensive Study Materials, Program Courseware and Self-Testing Software
  • Fully instructor-led program with 24 hour lab access
  • Examination vouchers *
  • On site testing **
  • Accommodation, all meals, unlimited beverages, snacks and tea / coffee***
  • Transportation to/from designated local railway stations
  • Examination Passing Policy

Please note

  • *Examination vouchers are not included for the following courses: PMP, CAPM, CISA, CISM, CGEIT, CRISC and CISSP CBK Review
  • **On site testing is not included in our PMP, CISA, CISM, CGEIT, CRISC, or ITIL Managers and Revision Certifications
  • ***Accommodation not included on the CISSP CBK Review Seminar

Our instructors teach to accommodate every student's learning needs through individualised instruction, hands-on labs, lab partner and group exercises, independent study, self-testing, and question/answer drills.

Firebrand Training has dedicated, well-equipped educational facilities where you will attend instruction and labs and have access to comfortable study and lounging rooms. Our students consistently say our facilities are second-to-none.

Examination Passing Policy

Should a student complete a Firebrand Training Program without having successfully passed all vendor examinations, the student may re-attend that program for a period of one year.  Students will only be responsible for accommodations and vendor exam fees.

Read more ...

Interested? See prices or call 024-8457770

You should be familiar with IT security best practices, the basics of TCP/IP networking, and basic programming concepts. You should also be familiar with Metasploit and VMware.

Knowledge of programming languages isn't necessary, but it is beneficial if you have exposure to a common programming or scripting language such as Python, Perl, Ruby, C, C++, or Assembly. A programming background is not required, but you will be writing lots of code in class.

Interested? See prices or call 024-8457770