Duration: 5 Days
Laptop Required: Yes
This class is open to all forensic professionals.
Students will learn how to adapt techniques like JTAG, ISP, Chip-Off, and apply it to embedded communication protocols such as SPI, i2C, UART and more, in order to exploit components and recover data from various sources like embedded code and the flash memory of controller chips. Data from these sources can then be analyzed for evidence or malware artifacts.
We encourage students to bring their own laptops whenever possible. If this is not possible, TeelTech will provide one for you. If you do plan on bringing your own laptop, indicate so on the registration page and please ensure they meet the following requirements.