This course covers advanced techniques for writing exploits and patching vulnerabilities, taught through an intense, hands-on security laboratory. A significant part of this course involves solving Capture-The-Flag (CTF) challenges and discussing strategies for such problems. Topics include (but are not limited to) reverse engineering, exploitation, binary analysis, and web security.