Certification Programmes

MCSI Certification

MVRE - Certified Vulnerability Researcher and Exploitation Specialist

An MCSI qualified professional Vulnerability Researcher and Exploitation Specialist is capable of identifying software vulnerabilities using techniques such as fuzzing harnesses, patch diffing, taint analysis, SMT solvers, static code analysis and OSINT research. Furthermore, they can also write fully-fledged exploits that bypass mitigations deployed from Windows XP to Windows 10.

Individuals who have successfully achieved their MVRE Certification can discover and exploit zero-day vulnerabilities in software deployed on workstations, servers, smartphones and embedded systems.

Register Now
Intermediate Level MCSI Certification Advanced
ic-certificate Certification
ic-clock 600+ hours
cpe-points 225
ic-money US$450
No Expiry, No Renewals

Overview

MCSI Certifications are world-class. The content is cutting-edge, uniquely-designed, hands-on and challenging. Our exercises teach in-demand skills that are immediately applicable in the field. MCSI's unique approach helps students around the world advance their careers.

This Certification has no expiry date. It has no renewal fees, no hidden fees, and is accessible with no time limits.

MCSI Certified Vulnerability Researcher and Exploitation Specialist:

  • Identify and select high-value targets for vulnerability research
  • Perform Attack Surface Identification and establish key focus areas for vulnerability research
  • Employ multiple vulnerability research techniques such as fuzzing harnesses, patching diffing, OSINT research, taint analysis and SMT Solvers
  • Triage crashes and identify the best bugs to spend energy and time exploiting
  • Bypass modern exploit mitigations on Windows 10
  • Develop and weaponize N-Days and Zero-Days

This Certification focuses 100% on teaching vulnerability research and exploitation techniques for the Windows operating system. Nonetheless, all the knowledge and tradecraft learnt can be applied on other operating systems such as Unix, OSX, and iOS.

Curriculum

Training Modules

  • Lab Setup - 5 exercises
  • Key Concepts - 4 exercises
  • Documentation - 5 exercises
  • Learning Ghidra - 8 exercises
  • Attack Surface Identification - 11 exercises
  • Static Analysis - 7 exercises
  • Dynamic Analysis - 7 exercises
  • Fuzzing Harnesses - 7 exercises
  • Vulnerability Exploitation - 10 exercises
  • Bypassing Mitigations - 12 exercises
  • Triaging - 5 exercises
  • Code Logic Vulnerabilities - 5 exercises
  • Race Condition Vulnerabilities - 3 exercises
  • Weaponisation - 4 exercises
  • Patching Diffing - 3 exercises
  • Attacking Browsers - 8 exercises
  • OSINT Research - 5 exercises
  • Reporting Vulnerabilities - 3 exercises
  • Advanced Ghidra - 4 exercises
  • Taint Analysis - 2 exercises
  • SMT Solvers - 2 exercises

Scenarios

  • Real-World Vulnerability Research Challenges - 6 exercises
  • Operation Industrial Delta - 11 exercises
  • Operation Black Panther - 8 exercises

Sample Exercises

Below are three (3) exercises from the 100+ exercises available in MVRE - Vulnerability Researcher and Exploitation Specialist certification:

Reverse engineer A Network Service And Identify Its Network Capabilities (Novice)

exercise


Take A Userland Exploit From Metasploit That Works On Windows 7 And Make It Work On Windows 10 (Advanced Beginner)

exercise


Write An N-Day Exploit For A Google Chrome Vulnerability (Competent)

exercise

Enrolment and Fees

Fees

US$450 (+ GST if you're based in Australia).

Practical exercises must be completed online using MCSI's Online Learning Platform.

How to enrol

  1. Login/Register for MCSI's Online Learning Platform
  2. Select `Shop` from the left-side menu
  3. Find the MVRE - Certified Vulnerability Researcher and Exploitation Specialist, select `Buy` and proceed through the checkout process. You can purchase using a Credit Card or PayPal
  4. Once you have enrolled in the MVRE - Certified Vulnerability Researcher and Exploitation Specialist, the curriculum unlocks immediately
  5. In the left-side menu of the platform, select `Training & Education` then `MCSI Curriculums`, and you will see the MVRE - Certified Vulnerability Researcher and Exploitation Specialist listed
Register Now

Terms and Conditions

  • No discounts
  • No refunds
  • No transfers
  • No renewal fees
  • No hidden fees
  • No time limits

Cooling-Off Policy

Receive a full refund if you change your mind about a purchase within 24 hours. No questions asked.

Read the full details here.

Student Testimonials

Here's what students say about the MCSI Method™ and our Online Learning Platform:

Student Testimonials

Requirements

Proficiency in the English language

Ability to comfortably read and understand IT documentation written in English. Ideally, an IELTS score of 6.5 with no band less than 6 (or equivalent).

Note: You can register for this course without having undertaken an English test.

Prerequisite Experience

We recommend at least three (3) years of hands-on experience delivering penetration testing engagements in the field. OR

Knowledge and hands-on experience in low-level x86-64 programming and operating systems internals, particularly Windows internals.

Prerequisite Mindset

Vulnerability research and exploitation requires time, dedication and persistence. We recommend that only highly-motivated students undertake this advanced course.

Prerequisite Knowledge

  • Knowledge of Windows Internals (e.g. processes, services, DLLs, privilege levels etc.)
  • Knowledge of x86-64 Assembly and low-level debugging tools and techniques
  • Knowledge of computer networking concepts and protocols, and network security methodologies
  • Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks)
  • Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.)
  • Knowledge of Internet and routing protocols
  • Knowledge of Internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering)
  • Knowledge of scripting languages
  • Knowledge of strategies and tools for target research
  • Knowledge of the basic structure, architecture, and design of modern applications
  • Knowledge of the basic structure, architecture, and design of modern communication networks

Prerequisite Skills

  • Skills in searching for, identifying, and using online resources
  • Skills in writing programs in C/C++ and Python
  • Skills in installing software in virtual machines
  • Skills in technical writing
  • Skills in writing about facts and ideas in a clear, convincing, and organized manner
  • Skills in using command line utilities and tools
  • Skills in troubleshooting and resolving software errors
  • Skills in using a disassembler and debugger

Frequently Asked Questions

What is the MCSI Method™?

Common Questions

  • Are solutions included in certifications and bundles?
    • No. Our method of teaching cyber security consists of challenging you with real-world problem statements that you're expected to research and solve by doing your own research. This is how you'll be expected to work in the field. When you fail an exercise, we provide you with constructive feedback to improve and try again.
  • Do the videos provides the answers to exercises?
    • No. The videos teach concepts, mindset, methodologies, procedures and professional skills such as report writing, interviewing and preparing proposals.
  • Do bundles, training content, or certificates ever expire? Am I expected to buy again in the future?
    • Once purchased, bundles and certificates are unlocked forever. They are no recurring or ongoing fees.
  • Do I need to buy the training and the certification separately?
    • No. The price provided covers both. You only pay once.
  • Do you offer any special offers and discounts?
    • No.
  • If I can't solve the exercise where do I go for help?
  • Who reviews and marks exercises?
    • Trained cyber security instructors that work for Mossé Cyber Security Institute.
  • We can't pay via credit card. Can you raise an invoice for international wire payment instead?
    • Yes. Send us the list of bundles and certifications you want to purchase at [email protected]
  • Can I access a trial/demo the certification programmes prior to enrolling?
    • We provide a free curriculum with 82 practical exercises you can try.
    • The Free Curriculum teaches Security Tools, Penetration Testing, Red Teaming, Threat Hunting, Cyber Defence, GRC and Windows Internals.
    • Try the Free Curriculum
  • What is an `Unofficial Curriculum`?
    • An `Unofficial Curriculum` contains MCSI's practical exercises aligned to a non-MCSI Industry Certification syllabus.
    • We offer unofficial curriculums for the OSCP, ISACA CISA, ISACA CISM, ISACA CRISC, CCT ICE, CCSAS, CCT ACE.
  • Do you provide Continuing Professional Education (CPE) credits?
    • Yes. Every single exercise offers CPE credits. The number of credits earned depends on the difficulty of the exercise completed. Below are the CPE Credits achieve for an exercise in each difficulty:
    • Novice exercises = 1 CPE credits
    • Advanced Beginner exercises = 2 CPE credits
    • Competent exercises = 5 CPE credits
    • Proficient exercises= 8 CPE credits
    • Beyond Proficient exercises = 16 CPE credits
  • Are MCSI courses/certifications recognized and have value outside of Australia?
    • Yes. MCSI certifications have value worldwide and are recognized by employers looking for individuals with practical cyber security skills.
    • MCSI's training is 100% practical with real cybersecurity problems designed to teach immediately applicable skills in the field. To solve our practical exercises, students must do their own research and develop their own solutions.
    • While completing exercises, students also develop their own comprehensive cybersecurity portfolio of skills. Individuals use this portfolio to demonstrate their cybersecurity competencies to solve real industry problems to future employers or hiring managers.
  • Do I need to complete an exam to receive MCSI Certification?
    • No. MCSI Certifications are completed by solving practical cybersecurity exercises.

Career Outcomes

This certification successfully prepares you for the following roles:

  • Vulnerability Researcher
  • Senior Penetration Tester
  • Senior Red Teamer
Certification Detail

Training Curriculum and Certifications

Students unlock Certificates of Completion for every exercise they complete. Industry Certifications are unlocked upon achieving Skills Proficiency Milestones.

1
ic-step-1

Student

2
ic-step-2

Obtain CPE points by solving exercises

3
ic-step-3

Achieve multiple certifications

4
ic-step-4

Receive help from instructors online

MCSI's MVRE certification covers all six levels of the Australian Signals Directorate's Cyber Skills Framework. You will achieve a certificate upon reaching each level. You will earn an industry certification at Level 5. Click here to learn more.

ASD Skills Proficiency Level Curriculum Completion Requirement Scenarios Completion Requirement
MCSI Vulnerability and Exploitation Learner Level 1 0% 0%
MCSI Novice Vulnerability and Exploitation Practitioner Level 2 20% 0%
MCSI Vulnerability and Exploitation Practitioner Level 3 50% 25%
MCSI Senior Vulnerability and Exploitation Practitioner Level 4 70% 50%
MCSI Certified Principal Vulnerability and Exploitation Practitioner Level 5 80% 100%
MCSI Certified Expert Vulnerability and Exploitation Practitioner Level 6 95% 100%

As an MCSI Certified Vulnerability Researcher and Exploitation Specialist you will be fully capable of performing the following:

  • Key Topics
    • Static Analysis
    • Dynamic Analysis
    • Attack Surface Identification
    • Fuzzing Harnesses
    • Stack Overflow
    • Heap Overflow
    • Use-after-Free
    • Race Conditions
    • Triaging
  • Vulnerability Research Tools
    • Ghidra
    • Domato
    • BinDiff
    • DynamoRio
    • WinAFL
    • WinDBG
    • Qiling
    • ProcMon
    • RPCView
    • Process Hacker
    • WinObjEx
    • OleViewDotNet
    • NtObjectManager
  • Bypassing Mitigations
    • Stack Cookies
    • DEP
    • ASLR
    • CFG
    • KASLR
    • SMEP
  • Triaging Crashes
    • Doctor Memory
    • ASAN
    • Driver Verifier
    • Root Cause Analysis
  • OSINT Research
    • Identifying high-value targets
    • Profiling developers
    • Discovering vulnerability patterns
  • Advanced Topics
    • Integrating exploits into Metasploit
    • Developing target validation capabilities
    • Identifying vulnerabilities using patch diffing
    • Writing N-Day exploits
    • Taint Analysis
    • SMT Solvers
  • Targets
    • Network services
    • Desktop applications
    • Browsers
    • Anti-virus software

Why MCSI’s Vulnerability Researcher and Exploitation Certification is World Class

why MCSI certifications

Comprehensive, Effective, Exceeds Standards

Holders of the MVRE Certification have completed 100 practical online exercises thus demonstrating that they have the skills and knowledge in the following areas: software fuzzing, triaging, bypassing mitigations, weaponisation, patching diffing, taint analysis, and identifying zero-days in browsers, desktop applications, network services, smartphone applications and embedded systems.

why MCSI certifications

Internals Focused

Students who have obtained this Certification have demonstrated that they have a full understanding of the Windows operating system's internals and they are capable bypassing exploit mitigations from Windows XP to Windows 10.

why MCSI certifications

Zero-Day Level

Students who have obtained MVRE have demonstrated that they can identify and exploit zero-day vulnerabilities across multiple platform and types of software.

DO YOU HAVE A QUESTION?

We'll respond within 24 hours

Visit our Frequently Asked Questions (FAQ) page for answers to the most common questions we receive.

Ready to learn hands-on cyber security skills online?

Register Now