IoT/Embedded Device Hacking

nov-workshop-banner

Join our first international IoT/Embedded Device Hacking Training in Malaysia and learn from world class experts!

Click here to view more about the international IoT/Embedded Device Hacking Training

  • Venue: Condition Zebra Professional Learning Centre
  • Date: May 15-19, 2017 (5 days)
  • Time: 9.00am – 5.00pm

Embedded and IoT device hacking is growing concern across the globe. However, if you have never had any experience in reverse engineering or embedded system hacking, you might be afraid of getting started in. This training course is designed to help people working in the information security industry to learn basic knowledge needed to hack and reverse-engineer embedded system. The training covers embedded device hacking with UART/JTAG, dumping/parsing/extracting/analyzing firmware image, modifying firmware, detecting/analyzing embedded malware, discovering/exploiting vulnerabilities in firmware, and wireless hacking using SDR.

Come, join us to learn the art of IoT hacking and security!

Seats are limited. Reserve your seat now!

 

Course Outline:

  • Hunting for UART ports
  • Hacking Embedded Device with JTAG
  • Firmware Acquisition
  • Firmware Unpacking
  • Basics of Reverse Engineering ARM/MIPS Code
  • Embedded Device Vulnerability Assessment
  • Embedded Malware Detection and Analysis
  • Modifying Firmware for Fun and Profit
  • Hacking Wireless Network

 

Prerequisite Knowledge and Requirements:

  • Should be familiar with using Windows, Linux and VMWare
  • Should have an understanding of programming concepts, but programming experience is not mandatory
  • Background knowledge in reverse code engineering and vulnerability assessment will be helpful, but not required
  • Enthusiasm is a must

 

Who Should Attend:

Professionals who are working in information security industry and interested to expand their hacking and reverse engineering
skills in IoT/embedded device.

 

What will be offered to attendees:

  • Training materials
  • Lab instruction note
  • Videos used in the course
  • Linux virtual machine image containing necessary tools
  • Various tools and devices used in hand-on practice

 

Trainer Profile:

Tae-il Kim – Founder & CEO of Core Security (Korea)

Tae-il has about 20 years’ extensive lecturer experience in information security industry since 1999. He is one of the most famous instructors in Korea. He has lectured about reverse engineering, penetration testing, digital forensics, exploit writing, and embedded device hacking at Korean government agencies (Korea National Police Agency, Korea Internet Security Agency, Ministry of National Defense, Cyber Command, Republic of Korea Army, and so on) and the international institute and companies (Philippine Interpol, Hyundai Motor Group, LG Electronics, Samsung Advanced Technology Training Institute, and
so on).

Neo Park – Director of Global Business Development of Core Security (Korea)

He identifies strategic partnership opportunities, presents initiatives for approval by executive management, negotiates through all phases of partner execution, and builds strong interpersonal relationships across the business and cross-functional teams to help deliver results. Also, he has been teaching computer security, computational science, programming courses in Cyber Security department at Far East University, South Korea. He has technical expertise as much as business capability. He participated in Global information security business development project funded by Korean government in November, 2016. And he published two papers title ‘Detection System Model of Zombie PC using Live Forensics Techniques’ and ‘Cyber Threat Prediction Model Using Security Monitoring System Event’ in 2012.

Seats are limited. Reserve your seat now!

 

Login

Password Reset
Please enter your registered e-mail address for InfoRisk 360 Instructor Portal. You will receive a new password via e-mail.