1 |
 |
Day 1 Part 1: Introductory Intel X86: Architecture, Assembly, Applications |
11 years, 4 months |
OpenSecurityTraining.Info |
OpenSecurityTraining.info, Computer security class, Computer Security, Cyber Security, CyberSecurity, Host Security, Disassembly, Reverse Engineering, Computer, Computers Security, Technology, Intel, x86, IA32, Training, Education, Multi-day-class, Multi-day-training, Classes |
5938 |
4 |
2 |
 |
Day 1 Part 2: Introductory Intel X86: Architecture, Assembly, Applications |
11 years, 4 months |
OpenSecurityTraining.Info |
OpenSecurityTraining.info, Computer security class, Computer Security, Cyber Security, CyberSecurity, Host Security, Disassembly, Reverse Engineering, Computer, Computers Security, Technology, Intel, x86, IA32, Training, Education, Multi-day-class, Multi-day-training, Classes |
3737 |
None |
3 |
 |
Day 1 Part 3: Introductory Intel X86: Architecture, Assembly, Applications |
11 years, 4 months |
OpenSecurityTraining.Info |
OpenSecurityTraining.info, Computer security class, Computer Security, Cyber Security, CyberSecurity, Host Security, Disassembly, Reverse Engineering, Computer, Computers Security, Technology, Intel, x86, IA32, Training, Education, Multi-day-class, Multi-day-training, Classes |
3763 |
None |
4 |
 |
Day 1 Part 4: Introductory Intel X86: Architecture, Assembly, Applications |
11 years, 4 months |
OpenSecurityTraining.Info |
OpenSecurityTraining.info, Computer security class, Computer Security, Cyber Security, CyberSecurity, Host Security, Disassembly, Reverse Engineering, Computer, Computers Security, Technology, Intel, x86, IA32, Training, Education, Multi-day-class, Multi-day-training, Classes |
3495 |
None |
5 |
 |
Day 1 Part 5: Introductory Intel X86: Architecture, Assembly, Applications |
11 years, 4 months |
OpenSecurityTraining.Info |
OpenSecurityTraining.info, Computer security class, Computer Security, Cyber Security, CyberSecurity, Host Security, Disassembly, Reverse Engineering, Computer, Computers Security, Technology, Intel, x86, IA32, Training, Education, Multi-day-class, Multi-day-training, Classes |
4114 |
None |
6 |
 |
Day 2 Part 1: Introductory Intel X86: Architecture, Assembly, Applications |
11 years, 4 months |
OpenSecurityTraining.Info |
OpenSecurityTraining.info, Computer security class, Computer Security, Cyber Security, CyberSecurity, Host Security, Disassembly, Reverse Engineering, Computer, Computers Security, Technology, Intel, x86, IA32, Training, Education, Multi-day-class, Multi-day-training, Classes |
3699 |
None |
7 |
 |
Day 2 Part 2: Introductory Intel X86: Architecture, Assembly, Applications |
11 years, 4 months |
OpenSecurityTraining.Info |
OpenSecurityTraining.info, Computer security class, Computer Security, Cyber Security, CyberSecurity, Host Security, Disassembly, Reverse Engineering, Computer, Computers Security, Technology, Intel, x86, IA32, Training, Education, Multi-day-class, Multi-day-training, Classes |
3503 |
None |
8 |
 |
Day 2 Part 3: Introductory Intel X86: Architecture, Assembly, Applications |
11 years, 4 months |
OpenSecurityTraining.Info |
OpenSecurityTraining.info, Computer security class, Computer Security, Cyber Security, CyberSecurity, Host Security, Disassembly, Reverse Engineering, Computer, Computers Security, Technology, Intel, x86, IA32, Training, Education, Multi-day-class, Multi-day-training, Classes |
3553 |
None |
9 |
 |
Day 2 Part 4: Introductory Intel X86: Architecture, Assembly, Applications |
11 years, 4 months |
OpenSecurityTraining.Info |
OpenSecurityTraining.info, Computer security class, Computer Security, Cyber Security, CyberSecurity, Host Security, Disassembly, Reverse Engineering, Computer, Computers Security, Technology, Intel, x86, IA32, Training, Education, Multi-day-class, Multi-day-training, Classes |
3670 |
None |
10 |
 |
Day 2 Part 5: Introductory Intel X86: Architecture, Assembly, Applications |
11 years, 4 months |
OpenSecurityTraining.Info |
OpenSecurityTraining.info, Computer security class, Computer Security, Cyber Security, CyberSecurity, Host Security, Disassembly, Reverse Engineering, Computer, Computers Security, Technology, Intel, x86, IA32, Training, Education, Multi-day-class, Multi-day-training, Classes |
3599 |
None |
11 |
 |
Day 2 Part 6: Introductory Intel X86: Architecture, Assembly, Applications |
11 years, 4 months |
OpenSecurityTraining.Info |
OpenSecurityTraining.info, Computer security class, Computer Security, Cyber Security, CyberSecurity, Host Security, Disassembly, Reverse Engineering, Computer, Computers Security, Technology, Intel, x86, IA32, Training, Education, Multi-day-class, Multi-day-training, Classes |
3838 |
3 |
12 |
 |
Day 1 Part 1: Introduction To Software Exploits |
11 years, 4 months |
OpenSecurityTraining.Info |
OpenSecurityTraining.info, Exploits, software vulnerabilities, buffer overflows, smashing the stack, heap overflows, ebp overwrite, reverse engineering, Computer, Computers Security, Technology, Intel, x86, IA32, Training, Education, Multi-day-class, Multi-day-training, Classes |
4516 |
None |
13 |
 |
Day 1 Part 2: Introduction To Software Exploits |
11 years, 4 months |
OpenSecurityTraining.Info |
OpenSecurityTraining.info, Exploits, software vulnerabilities, buffer overflows, smashing the stack, heap overflows, ebp overwrite, reverse engineering, Computer, Computers Security, Technology, Intel, x86, IA32, Training, Education, Multi-day-class, Multi-day-training, Classes |
3802 |
None |
14 |
 |
Day 1 Part 3: Introduction To Software Exploits |
11 years, 4 months |
OpenSecurityTraining.Info |
OpenSecurityTraining.info, Exploits, software vulnerabilities, buffer overflows, smashing the stack, heap overflows, ebp overwrite, reverse engineering, Computer, Computers Security, Technology, Intel, x86, IA32, Training, Education, Multi-day-class, Multi-day-training, Classes |
3829 |
None |
15 |
 |
Day 1 Part 4: Introduction To Software Exploits |
11 years, 4 months |
OpenSecurityTraining.Info |
OpenSecurityTraining.info, Exploits, software vulnerabilities, buffer overflows, smashing the stack, heap overflows, ebp overwrite, reverse engineering, Computer, Computers Security, Technology, Intel, x86, IA32, Training, Education, Multi-day-class, Multi-day-training, Classes |
3690 |
None |
16 |
 |
Day 1 Part 5: Introduction To Software Exploits |
11 years, 4 months |
OpenSecurityTraining.Info |
OpenSecurityTraining.info, Exploits, software vulnerabilities, buffer overflows, smashing the stack, heap overflows, ebp overwrite, reverse engineering, Computer, Computers Security, Technology, Intel, x86, IA32, Training, Education, Multi-day-class, Multi-day-training, Classes |
3775 |
None |
17 |
 |
Day 1 Part 6: Introduction To Software Exploits |
11 years, 4 months |
OpenSecurityTraining.Info |
OpenSecurityTraining.info, Exploits, software vulnerabilities, buffer overflows, smashing the stack, heap overflows, ebp overwrite, reverse engineering, Computer, Computers Security, Technology, Intel, x86, IA32, Training, Education, Multi-day-class, Multi-day-training, Classes |
3596 |
None |
18 |
 |
Day 2 Part 1: Introduction To Software Exploits |
11 years, 3 months |
OpenSecurityTraining.Info |
OpenSecurityTraining.info, Exploits, software vulnerabilities, buffer overflows, smashing the stack, heap overflows, ebp overwrite, reverse engineering, Computer, Computers Security, Technology, Intel, x86, IA32, Training, Education, Multi-day-class, Multi-day-training, Classes |
3497 |
None |
19 |
 |
Day 2 Part 2: Introduction To Software Exploits |
11 years, 3 months |
OpenSecurityTraining.Info |
OpenSecurityTraining.info, Exploits, software vulnerabilities, buffer overflows, smashing the stack, heap overflows, ebp overwrite, reverse engineering, Computer, Computers Security, Technology, Intel, x86, IA32, Training, Education, Multi-day-class, Multi-day-training, Classes |
3303 |
None |
20 |
 |
Day 2 Part 3: Introduction To Software Exploits |
11 years, 3 months |
OpenSecurityTraining.Info |
OpenSecurityTraining.info, Exploits, software vulnerabilities, buffer overflows, smashing the stack, heap overflows, ebp overwrite, reverse engineering, Computer, Computers Security, Technology, Intel, x86, IA32, Training, Education, Multi-day-class, Multi-day-training, Classes |
3383 |
None |
21 |
 |
Day 2 Part 4: Introduction To Software Exploits |
11 years, 3 months |
OpenSecurityTraining.Info |
OpenSecurityTraining.info, Exploits, software vulnerabilities, buffer overflows, smashing the stack, heap overflows, ebp overwrite, reverse engineering, Computer, Computers Security, Technology, Intel, x86, IA32, Training, Education, Multi-day-class, Multi-day-training, Classes |
3274 |
None |
22 |
 |
Day 2 Part 5: Introduction To Software Exploits |
11 years, 3 months |
OpenSecurityTraining.Info |
OpenSecurityTraining.info, Exploits, software vulnerabilities, buffer overflows, smashing the stack, heap overflows, ebp overwrite, reverse engineering, Computer, Computers Security, Technology, Intel, x86, IA32, Training, Education, Multi-day-class, Multi-day-training, Classes |
3436 |
None |