Students will be provided with a foundation of how electronics work in relation to the techniques being used in this training. The processes taught will include tools from cost effective sources, open source resources, and commercial tools.
Students will learn how to adapt techniques like JTAG, ISP, Chip-Off, and apply it to embedded communication protocols such as SPI, i2C, UART and more, in order to exploit components and recover data from various sources like embedded code and the flash memory of controller chips. Data from these sources can then be analyzed for evidence or malware artifacts.
Includes Teel Tech EHAAT Student Kit
Laptop Minimum Requirements
We encourage students to bring their own laptops whenever possible. If this is not possible, TeelTech will provide one for you. If you do plan on bringing your own laptop, indicate so on the registration page and please ensure they meet the following requirements.
macOS with Bootcamp Windows
macOS alone will not work (No Virtual Machines)
8GB RAM (minimum)
100GB storage (minimum)
You must have admin rights or have the admin password for software installation.
NOTE: ALL Windows updates should be done prior to class