1601 Broadway, New York, NY 10019 B3 TRAINING
May 09, 2018 10:00 AM - 04:00 PM(America/New_York)
20180509T1000 20180509T1600 America/New_York IoT Firmware Exploitation and Attack Countermeasures

Submission type description : 2 Day   The IoT Firmware Exploitation and Attack Countermeasures training is designed to provide techniques for testing of embedded IoT systems, employing proactive controls, embedded application security best practices, and address the challenges of building security into embedded devices. This course is suited for embedded systems engineers, software developers, and security professionals. Hands on demonstrations and labs will be given throughout the course. Upon completion of the course, trainees will learn the following:   - How to identify vulnerabilities in embedded devices - Understand the embedded security testing methodology, techniques, and tools - Firmware reverse engineering, emulation, and binary exploitation - How to backdoor firmware for MIPs and ARM architectures - Understand embedded system design constraints that pose security risks - Learn defensive practices to protect embedded applications - Identify and apply best practices, as well as techniques for integrating security into the software development lifecycle -Understand security controls for Embedded, Linux, Embedded Windows, and RTOS platforms -Understand IoT botnet exploitation techniques that impact critical infrastructures and how to apply appropriate mitigating controls for product security teams   Course Prerequisites: - Familiarity with a Linux operating system - Admin Rights to Computer….If you do not have install rights no problem as we will work in pairs for the labs.   Hardware: - At least 25 GB of free space - Laptop with a minimum of 4 GB RAM - USB access allowed   Software: - Virtualization software installed (VMWare and/or VirtualBox)   At the start of the class, we will share a virtual machine which will have all th ...

1601 Broadway, New York, NY 10019 B3 HACK NYC 2018 events@magegroupe.com
1 attendees saved this session
Submission type description : 2 Day
 
The IoT Firmware Exploitation and Attack Countermeasures training is designed to provide techniques for testing of embedded IoT systems, employing proactive controls, embedded application security best practices, and address the challenges of building security into embedded devices. This course is suited for embedded systems engineers, software developers, and security professionals. Hands on demonstrations and labs will be given throughout the course. Upon completion of the course, trainees will learn the following:
 
- How to identify vulnerabilities in embedded devices
- Understand the embedded security testing methodology, techniques, and tools
- Firmware reverse engineering, emulation, and binary exploitation
- How to backdoor firmware for MIPs and ARM architectures
- Understand embedded system design constraints that pose security risks
- Learn defensive practices to protect embedded applications
- Identify and apply best practices, as well as techniques for integrating security into the software development lifecycle
-Understand security controls for Embedded, Linux, Embedded Windows, and RTOS platforms
-Understand IoT botnet exploitation techniques that impact critical infrastructures and how to apply appropriate mitigating controls for product security teams
 
Course Prerequisites:
- Familiarity with a Linux operating system
- Admin Rights to Computer….If you do not have install rights no problem as we will work in pairs for the labs.
 
Hardware:
- At least 25 GB of free space
- Laptop with a minimum of 4 GB RAM
- USB access allowed
 
Software:
- Virtualization software installed (VMWare and/or VirtualBox)
 
At the start of the class, we will share a virtual machine which will have all the tools and labs preconfigured for the training.
Head of Automotive & IoT
,
Gotham Digital Science
No moderator for this session!
Attendees public profile is disabled.
Upcoming Sessions
321 visits

FAQ

 Code of Conduct  Press Releases
 Get Involved   Report ISSUE / BUG
Tickets  

The Critical Infrastructure Association of America, Inc. is a 501(c)6 Not for Profit. The mission of Critical Infrastructure Association of America is to create a membership-based, trade association of like-minded cybersecurity and closely related industry professionals that work in the field of cybersecurity. The goal is to share best practices, establish and maintain high operational standards and to educate and interact with those in the cybersecurity community within public, private and governmental sectors.