Fuzzing is a critical part of the security development lifecycle. This particular technique is used by hackers to find bugs. In this course, software makers will learn how to fuzz - before the bad guys do.
Bugs in software costs the economy billions of dollars each year. In this course, Security for Hackers and Developers: Fuzzing, you are going to turn the tide by learning how to find and fix critical bugs quicker. Hackers have long used a technique called fuzzing to find bugs and software makers must do the same. First, you'll learn about mutation and generation fuzzing. Next, you'll explore monitoring, parallel fuzzing, and in-memory fuzzing. Finally, the course will wrap up with you learning about feedback fuzzing. By the end this course, you'll know how to fuzz programs in multiple ways. You'll know the pros and cons of each technique, and be able to make wise choices for your security program.
Dr. Jared DeMott is the founder of the security company, Vulnerability Discovery & Analysis (VDA) Labs. DeMott is a former NSA security analyst, Microsoft BlueHat Prize winner, and was the CTO and Binary Defense. He's frequently quoted in media, and invited to speak at security events.
Course Overview Hi everyone, my name is Dr. DeMott and welcome to my course on fuzzing. This is the third course in the Security for Hackers and Developers learning path. I'm the CTO of an enterprise security company and founder of a consulting and training company. I'm a long-time security researcher, vulnerability, malware, and code security expert. I love teaching and mentoring, so I'm happy to bring you another exciting course. Did you know that bugs in software cost the economy billions of dollars each year? In this course, we're going to turn the tide as I explain how to find and fix critical bugs quicker. Hackers have long used a technique called fuzzing to find bugs. Software makers must do the same. With a hands-on style, we'll cover topics such as mutation and generation fuzzing, monitoring and parallel fuzzing, API and in-memory fuzzing, and of course, the state of the art feedback fuzzing. By the end of this course, you'll know how to fuzz programs in multiple ways. You'll know the pros and cons of each technique and be able to make wise choices for your security program. Before beginning the course, you should take the first course in this series called Security for Hackers and Developers: Overview. After completing this course, you should feel comfortable with the other courses in this series, the Code auditing course and coming in 2017, the Reverse Engineering and Exploit development courses. I hope you'll join me on this journey towards safer code with the Security for Hackers and Developers: Fuzzing course at Pluralsight.