Specialized Attacks: Hardware Product Testing
Offered By: Pluralsight
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
This course will teach you to access firmware, analyze it and then reverse engineer it to identify weaknesses and vulnerabilities in the device.
Are you a pentester who wants to move on from network, application, and cloud testing? Are you an aspiring product tester who wants to advise clients on how to better protect a new device before it goes to market? Then this course is for you. In this course, Specialized Attacks: Hardware Product Testing, you’ll learn to obtain firmware and reverse engineer it to highlight weaknesses and vulnerabilities. First, you’ll explore the different ways to access a device’s firmware, ranging from searching the internet to extracting it directly from the device’s memory. Next, you’ll discover how to analyze a binary file to understand its structure and content. Finally, you’ll learn how to reverse engineer the firmware to identify sensitive information and software vulnerabilities. When you’re finished with this course, you’ll have the skills and knowledge to obtain, analyze, and reverse engineer firmware to identify hardware weaknesses and vulnerabilities in order to better protect them.
Are you a pentester who wants to move on from network, application, and cloud testing? Are you an aspiring product tester who wants to advise clients on how to better protect a new device before it goes to market? Then this course is for you. In this course, Specialized Attacks: Hardware Product Testing, you’ll learn to obtain firmware and reverse engineer it to highlight weaknesses and vulnerabilities. First, you’ll explore the different ways to access a device’s firmware, ranging from searching the internet to extracting it directly from the device’s memory. Next, you’ll discover how to analyze a binary file to understand its structure and content. Finally, you’ll learn how to reverse engineer the firmware to identify sensitive information and software vulnerabilities. When you’re finished with this course, you’ll have the skills and knowledge to obtain, analyze, and reverse engineer firmware to identify hardware weaknesses and vulnerabilities in order to better protect them.
Syllabus
- Course Overview 1min
- Security Testing Hardware 14mins
- Obtaining Firmware 18mins
- Analyzing Firmware 15mins
- Where Next? 4mins
Taught by
Matthew Lloyd Davies
Related Courses
Certified Ethical Hacker (CEH) - Linux Academy's Prep CourseA Cloud Guru CompTIA PenTest+ Certification
A Cloud Guru CompTIA Security+ Certification Prep
A Cloud Guru Advanced Cyber Security Training
EC-Council via FutureLearn Advanced Python Scripting for Cybersecurity
Infosec via Coursera