This course gives intrinsic details of exploiting stack and heap overflows in Windows software applications. It walks the students through all the steps that are necessary for bug hunting from reverse engineering to fuzzing to actually writing exploits in Windows software applications. It also teaches how a student should actually go about exploiting these vulnerabilities and bypassing the various Windows protection mechanisms. Overall, this is a course worth the money. It is one of the best tutorial for beginners as well as people who are inclined to understand the inner details of Windows protection mechanisms and bypass them.