Overview

This one-day workshop focuses on the risks and realities of hardware espionage and supply chain compromise. It is a hands-on environment where students will detect and analyze various forms of surreptitious hardware. Each section provides details of the threat, real-world examples, and recommendations for detection/mitigation.

Read more +

Prerequisites

Joe Grand's Hardware Hacking Basics two-day training

Read more +

Course Outline

A. Espionage Overview

B. Hardware Implants

  • Hands-on exercise: Build a keystroke-injection hardware implant, experiment with various payloads

C. Covert Channels/Data Exfiltration

  • Hands-on exercise: Discover multiple methods of covert channel on a custom circuit board, capture/decode exfiltrated data

D. Component-Level

  • Hands-on exercise: Identify functional difference between a known-good and modified device, determine resulting effect/weakness, reverse engineer the modification

E. Printed Circuit Board (PCB)

  • Hands-on exercise: Physical delayering of an intentionally-modified custom circuit board, identify differences in layout against known-good version, determine effect of modifications
Read more +

Why choose QA

Cyber Security learning paths

Want to boost your career in cyber security? Click on the roles below to see QA's learning pathways, specially designed to give you the skills to succeed.

= Required
= Certification
AI Security
Application Security
Cyber Blue Team
Cybersecurity Maturity Model Certification (CMMC)
Cloud Security
DFIR Digital Forensics & Incident Response
Industrial Controls & OT Security
Information Security Management
NIST Pathway
Offensive Security
Privacy Professional
Reverse Engineer
Secure Coding
Security Auditor
Security Architect
Security Risk
Security Tech Generalist
Vulnerability Assessment & Penetration Testing