Embedded Reversing and Exploitation Bootcamp
This course is intended for the engineers and scientists who are in the weeds assessing tactical platforms for cyber vulnerabilities.
This course is majority hands-on-keyboard reversing and exploiting embedded systems, with theory and lectures as needed.
Exercises include x86, x64, PowerPC, MIPS, and ARM architectures.
After completing this course, students will have the practical skills to identify and exploit vulnerabilities in embedded systems.