One level up from con
Introduction to Vulnerability Assessment
Android Forensics and Security Testing
Introduction to Trusted Computing
Introduction to Software Exploits
Exploits 2: Exploitation in the Windows Environment