I think Max did a great job thinking through how folks taking his course would best consume the content. The HeapLAB VM is setup with everything ready to go. No additional configurations are needed. You just hop into the directory for the technique Max is teaching and you have everything you need - pwnable binaries, templated exploit code and solution dot files.Much like with the ROPEmporium challenges, each binary you interact with throughout the course requires minimal, if any, reversing. The bugs themselves, such as a double free or write-after-free, will be immediately apparent when using the binary. I think this is one of the training's strong points - it removes a lot of the peripheral tasks and keeps you focused on the technique at hand which are complicated enough on their own.As to the techniques themselves, with rare exception, such as the unsafe unlink, these techniques are applicable to glibc versions found on most modern linux systems. We spent most of our time on very recent versions of glibc, including 2.27 which is included with ubuntu 18.04 LTS.Additionally, I really appreciated the effort Max took to make the binaries as realistic as possible. Each binary only contains one bug. At no point in the training is Max teaching some contrived scenario where 3 or 4 bugs have to line up in a certain way. In fact, the very first challenge binary you get at the end of day 1 gives you a single byte heap-based buffer overflow, it has no leaks and has modern memory protections enabled.While each day of the two day course was supposed to run until about 5pm, we ended up working until about 8pm each night making for 11 hour days, which was only possible because Max was willing to stay and work with us on the various challenge binaries.