Students will be provided with a foundation of how electronics work in relation to the techniques being used in this training. The processes taught will include tools from cost effective sources, open source resources, and commercial tools.
Students will learn how to adapt techniques like JTAG, ISP, Chip-Off, and apply it to embedded communication protocols such as SPI, i2C, UART and more, in order to exploit components and recover data from various sources like embedded code and the flash memory of controller chips. Data from these sources can then be analyzed for evidence or malware artifacts.
Laptop Minimum Requirements
We encourage students to bring their own laptops whenever possible. If this is not possible, TeelTech will provide one for you. If you do plan on bringing your own laptop, indicate so on the registration page and please ensure they meet the following requirements.