This course is intended for engineers who need to perform assessments and then actually demonstrate vulnerabilities on embedded systems, IoT devices or similar systems. Students learn how to find vulnerabilities, demonstrate them by writing exploits, and communicate the nature and severity of vulnerabilities to a non-technical audience.
This is a majority hands-on course, with theory and lectures as needed. Exercises focus on embedded Linux and ARM but other architectures are mixed in for perspective. This course balances application of skills with fundamental knowledge so no one is just “going through the steps” but rather is engaging in a creative problem-solving experience, just like in the real world.
- Students will be able to identify vulnerabilities in embedded products
- Students will be able to bypass multiple exploit mitigations
- Students will know the pros and cons of different approaches
- Students will be able to communicate findings to management
Students are expected to be familiar with reading and writing programs in C and Python We are experienced teachers and are prepared for a variance in backgrounds in each class. We specifically address this through our exercises and environment.