Training

We don't teach crafts, we shape minds.

Hypervisor Vulnerability Research

Image

Image

Image

Image

Comprehensive training focused on hypervisor system internals and security vulnerabilities. The program spans entire field around three core pillars: - hypervisor exploit surface topology - background theory in OS and hardware - many case studies of hypervisor VM escape bugs Practical exercises tackle the common vulnerability research workflows: from analysis of hypervisor codebases, to reverse engineering binary patches, to basic proof-of-concept exploit. Four hypervisor implementations are considered: Oracle VirtualBox, VMware Workstation, Microsoft Hyper-V, and Linux KVM. Beginner to intermediate level. Target audience is professional security researchers and hypervisor developers. New in 2025: a dedicated series of technical lectures exploring industry updates in 2021-2025.

For more information about the course, refer to the booklet.


Created by

Alisa Esage

Format

Self-paced video training with optional technical support

Access options

Option 1 Self-paced Package - Complete Price: 0.004 BTC / €4,095 Purchase

Option 2 Self-paced Package - Basic Price: 0.025 BTC / €2,625 Purchase

Share
1 • 0 • 1 • 0 • 1 • 0 • 1 • 0 • 1 • 0 • 1 • 0 • 1 • 0 • 1 • 0 • 1 • 0 • 1 • 0 • 1 • 0 • 1 •