MCA Offensive Security Exploit Developer (OSED)
The MCA Offensive Security Exploit Developer (OSED) is globally respected as a benchmark for advanced exploit development. At MCA, OSED is transformed into a comprehensive exploit research program where participants master memory corruption, vulnerability discovery, exploit chaining, and modern bypasses. Unlike conventional programs, MCA’s OSED trains participants to develop original exploits, contribute to vulnerability research, and lead global red team exploit campaigns — all while operating within ethical and legal frameworks.
Duration
12 Weeks
Mode
100% Online
Self-Paced
$200, ₦300,000
Live Online
$300, ₦450,000
Learning Objectives
- Conduct advanced vulnerability research across binaries, operating systems, and applications.
- Develop and weaponize exploits for memory corruption, heap, and kernel vulnerabilities.
- Apply advanced reverse engineering to binaries and malware samples
- Leverage fuzzing frameworks, symbolic execution, and AI-driven vulnerability discovery
- Bypass modern exploit mitigations (DEP, ASLR, Control-Flow Integrity, CFG).
- Research and exploit IoT, ICS/SCADA, and embedded device vulnerabilities.
- Publish vulnerability research responsibly and engage in bug bounty/industry programs.
Target Audience
- Advanced penetration testers and security researchers
- Reverse engineers specializing in exploit and malware analysis.
- Experts preparing for OSEE or equivalent advanced exploit development programs
Course Modules
- Advanced Exploit Development Foundations – MCA Framework
- Vulnerability Research Methodologies – Static, Dynamic, Hybrid
- Memory Corruption Exploitation – Stack, Heap, and Format Strings
- Reverse Engineering at Scale – Tools, Automation, and AI Support
- Windows Exploitation – Userland, Kernel, and Drivers
- Linux Exploitation – Privilege Escalation & Chaining Exploits
- Exploit Mitigation Bypasses – DEP, ASLR, CFG, SEHOP
- Fuzzing Techniques – Coverage-Guided, Mutation, and AI-Assisted
- Symbolic Execution and Advanced Vulnerability Discovery
- IoT and Embedded Systems Exploitation
- ICS/SCADA Vulnerability Research and Attack Simulations
- Browser and Client-Side Exploitation Frameworks
- Exploit Weaponization and Payload Developmen
- Advanced Shellcoding and Post-Exploitation Payloads
- Exploit Development in Cloud and Containerized Environments
- Responsible Disclosure and Legal/Ethical Dimensions of Exploit Research
- Leadership in Exploit Research Teams and Global Communities
- Capstone – Publishing a Zero-Day Exploit Research Paper
Certification Requirements
- Complete all modules and exercises
- Pass MCA Intermediate assessment
- Successfully complete the Capstone Research Project (Zero-Day Vulnerability Paper)