An Inside Look at TNS Training

save
Share and earn Cybytes
Facebook Twitter LinkedIn Email

An Inside Look at TNS Training

The hands-on training at Tactical Network Solutions makes conditions as realistic as possible. Students learn concepts, techniques and skills using real connected devices, firmware and software.

In all three tracks, trainers present new material and build on previously covered material. New concepts are introduced with respect to the groups’ understanding and experience as a whole.

Attendees immerse in interactive, short lectures and comprehensive labs designed by the TNS instructors. Our team of trainers are an elite group of former US intelligence offensive cyber operators who bring real-world experiences, tips, tricks and methods not seen or heard anywhere else.

Break It

Students get multiple opportunities to break things – also known as practice. At TNS, we believe it doesn’t matter how much natural talent a person has, he/she can still improve a skill by practicing. Our classes provide various opportunities to road-test skills – and the ultimate test occurs when students feel confident to perform skills learned in the training.

Practice exercises from the classes include:

Analyzing, reversing debugging and exploiting embedded RTOS firmwareUsing basic hardware debugging tools, PCB reverse engineering and circuit and signals analysisIdentifying, exploiting, and patching 0-day vulnerabilities in a real-world embedded device

Stop It

It’s important to provide hands-on training that approximates real work conditions while avoiding the risks associated with a learner’s mistakes. When our trainers set up equipment and procedures, participants learn to perform a skill without impeding the tasks of co-workers or potentially creating precarious conditions for others in their workplace.

A Look in the Mirror

Attendees have ample time to self-critique and to offer/receive casual peer review. When working in small teams, usually pairs, students review each others’ work and discuss ideas, which leads to greater learning for the group as a whole.

A Word About Learning Styles and Application

Our trainers recognize that people have different learning styles. Auditory and visual learners sometimes learn better by watching our trainers perform a task, then performing the tasks themselves. Kinesthetic learners, including many people who come to TNS, perform well when they can delve into activities from the start. Our hands-on training satisfies the needs of these the styles, offering chances to watch, listen and perform tasks.

 

TNS students come away with the ability to think like the bad guys and protect their own embedded firmware devices.

Share this post and earn Cybytes
Facebook Twitter LinkedIn Email
Follow
102 Followers
About Tactical Network Solutions
Are you concerned about risky, vulnerable embedded firmware in IoT devices, connected medical devices, automotive ECUs and industrial control systems? You're not alone. Since 2007, Fortune 500 companies and governments around the world have sought out Tactical Network Solutions for reverse engineering training programs, firmware evaluations, and cyber risk mitigation strategies. Clients are excited to leverage our automated firmware evaluations and consulting performed with the proprietary Centrifuge IoT Security Platform. The evals are completed with NO access to source code on compiled images containing a Linux-based root filesystem compiled for either MIPS, ARM, or X86. We also support QNX (a real-time operating system) and Docker containers. TNS evaluations have revealed thousands of hidden attack vectors including erroneously placed private crypto keys, insecure binaries with highly vulnerable function calls and other rampant security holes on embedded firmware. Our community of clients includes firmware developers, underwriters, law firms, governments and intelligence agencies worldwide who share a common goal: to discover hidden attack vectors in IoT and connected devices.
Promoted Content
TNS Issues a Sample IoT Security Report Showing Backdoors in a Connected Device
First, the good news: The extremely high number of connected devices rapidly coming to market has consumers and manufacturers excited. The new IoT devices often include advancements, more effective data collection and greater ease of use. Now, the bad news: When the devices are not built securely, they also bring unnecessary exposure, vulnerabilities, and danger.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel