CHRISTOPHER EMUCHAY
TR: 1D7X1P Learning Program (Percipio)
8.1.System Security8.1.1.Buffer Overflow8.1.2.Stack Overflow8.1.3.Heap Overflow8.1.4.Format String Attack8.1.5.Fuzzing8.1.6.Safe Functions8.1.7.Memory Leaks8.1.8.Root Kits8.1.9.Privilege Escalation/Lateral8.1.10.Check Return Values8.1.11.Shellcode8.2.Transport Security8.2.1.Session Hijacking8.2.2.Integrity / Checksum Check8.2.3.Cross Site Request Forgery8.3.Encryption8.3.1.Block8.3.2.Stream8.3.3.Securely Stored Tokens/Keys/Certificates8.3.4.End to End Encryption8.3.5.RSA8.3.6.Public Key Infrastructure (PKI)8.3.7.Certificates8.3.7.1.Certificate Trust Chain8.3.7.2.Certificate Revocation List8.3.7.3.Certificate Generation8.3.7.3.1.OpenSSL8.3.7.3.2.Bouncy Castle8.3.7.4.Authentication Levels8.4.Malware Reverse Engineering8.4.1.Strings8.4.2.Virus Total8.4.3.Advanced Static Analysis8.4.4.Advanced Dynamic Analysis8.4.5.Wireshark8.4.6.Imports/Exports8.4.7.Isolate in Virtual Machine8.5.Common Vulnerabilities and Exposures (CVE)8.6.Information Assurance Vulnerability Alert (IAVA)8.7.Auditing
Issued on
August 4, 2024
Expires on
Does not expire