April Offensive Cyber Training: It's All About Exploiting RTOS's

save
Share and earn Cybytes
Facebook Twitter LinkedIn Email

The TNS April training class focuses on methods for manipulating, modifying, debugging, reverse engineering, interacting with and exploiting firmware of embedded systems. You’ll gain hands-on experience and learn to interface with real-world devices and products.

 

Exploiting Real Time Operating Systems – April 17-21: This course will teach students how to analyze, reverse, debug, and exploit embedded RTOS firmware. Read more and register here>

Student Review: “I had high expectations for this class and they were absolutely met and exceeded! This class was just what I was looking for, I feel like I have a good understanding of the steps to take with RTOS exploitation. I also think that the exercises were great because they weren’t just step by step so they will translate well to the real world when looking at an unknown device. Thanks! I really enjoyed it!” – Kelly L.

 

 

Book a spot in the IoT Firmware Exploitation Class – May 8-12: This course is designed for white hat hackers, tinkerers, and hobbyists with limited experience and an interest in embedded systems analysis. Read more and register here>

Student Review: “I thought that the course was great. I was able to expand my knowledge of embedded systems and extracting firmware. Both instructors were very knowledgeable and very helpful. I definitely appreciated the time they took to ensure that understood the material.” – Jason

 

 

Reserve your seat in the next Hardware Hacking Workshop – May 16-18: From using basic hardware debugging tools, to PCB reverse engineering, to circuit and signals analysis, this course will take you from “zero to hero” and equip you with the skills and knowledge you need to approach the challenges of hardware reverse engineering with confidence. Read more and register here>

Student Review: “This course was a fantastic introduction to hardware hacking. We covered all the basics at a reasonable pace and there was plenty of content to consume 3 days. Using the logic analyzer and flyswatter were awesome!” – Jason O.

Share this post and earn Cybytes
Facebook Twitter LinkedIn Email
Follow
100 Followers
About Tactical Network Solutions
Are you concerned about risky, vulnerable embedded firmware in IoT devices, connected medical devices, automotive ECUs and industrial control systems? You're not alone. Since 2007, Fortune 500 companies and governments around the world have sought out Tactical Network Solutions for reverse engineering training programs, firmware evaluations, and cyber risk mitigation strategies. Clients are excited to leverage our automated firmware evaluations and consulting performed with the proprietary Centrifuge IoT Security Platform. The evals are completed with NO access to source code on compiled images containing a Linux-based root filesystem compiled for either MIPS, ARM, or X86. We also support QNX (a real-time operating system) and Docker containers. TNS evaluations have revealed thousands of hidden attack vectors including erroneously placed private crypto keys, insecure binaries with highly vulnerable function calls and other rampant security holes on embedded firmware. Our community of clients includes firmware developers, underwriters, law firms, governments and intelligence agencies worldwide who share a common goal: to discover hidden attack vectors in IoT and connected devices.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel