It is difficult to read the news today without encountering a story about a new security vulnerability. Have you ever wondered how these vulnerabilities come about, and how they are discovered and exploited?
This course will introduce you to basic concepts and techniques used in the exploitation of systems and software (i.e., hacking). From activists to cyber criminals to national security agencies, hackers are an inescapable reality of the information age. The goal of this course is, as the saying goes, to know your enemy so that you might defend yourself against them.