We don't teach crafts, we shape minds.
Comprehensive training focused on hypervisor system internals and security vulnerabilities. The program spans entire field around three core pillars: - hypervisor exploit surface topology - background theory in OS and hardware - many case studies of hypervisor VM escape bugs Practical exercises tackle the common vulnerability research workflows: from analysis of hypervisor codebases, to reverse engineering binary patches, to basic proof-of-concept exploit. Four hypervisor implementations are considered: Oracle VirtualBox, VMware Workstation, Microsoft Hyper-V, and Linux KVM. Beginner to intermediate level. Target audience is professional security researchers and hypervisor developers. New in 2025: a dedicated series of technical lectures exploring industry updates in 2021-2025.
For more information about the course, refer to the booklet.
Alisa Esage
Self-paced video training with optional technical support