Training offered by

Hardware Security is  relatively undefined field. There is only a very small amount of readily available, logically organized, and directly applicable information. The courses listed here are part of an effort to change that, one bit at a time.

Check for upcoming public training Inquire about booking private training

Full Length Courses

Standard 2-Day Courses

These courses regularly run in conjunction with conferences around the world, in addition to independent public and private offerings. Applied Physical Attacks 1: Embedded and IoT Systems covers a series of basic physical attacks that don’t require advanced modification or manipulation of an embedded ARM or MIPS target system. Applied Physical Attacks 2: Hardware Pentesting expands on the embedded class, incorporating more advanced attacks and fitting hardware into a standard penetration testing workflow. Applied Physical Attacks 3: Rapid Protoyping focuses on using rapid prototyping and hardware tooling to interface to target systems. Applied Physical Attacks 4: Hardware Implants brings the rapid prototyping and hardware pentesting techniques together to build standalone hardware attack devices.

Specialty 4-Day Courses

Due to the targeted focus of these courses, they’re rarely offered as public training but are available for private offerings. Applied Physical Attacks on x86 Systems covers a series of basic physical attacks that don’t require advanced modification or manipulation of an x86 target system. Applied Physical Attacks and Silicon Defenses covers the hardware security lifecycle plus pre- and post- silicon security testing of silicon, targeting a verilog SOC and additional IP blocks.

Free Courses

Single-day Courses

Applied Physical Attacks on a Raspberry Pi introduces hardware hacking basics with an inexpensive toolset. This workshop fully published and freely available to do on your own or run for a group.

Short Workshops

These 90 minute to half-day workshops have run at hackerspaces, conferences, hardware hacking villages, and other events. Hands-on JTAG for Fun and Root Shells covers the hardware and software setup for JTAG debugging on an ARM platform using OpenOCD. Once everything is configured, it introduces a couple methods of using JTAG to escalate privilege of and existing shell WTFPGA starts with a crash course in Verilog and introduces some of the core concepts of FPGAS for basic logic by guiding attendees through implementing a very basic hexadecimal calculator with switches and displays. Sidechannel Attacks for Hardware N00BZ introduces the concept of hardware side channel attacks and walks through the process of using hardware to conduct a timing side channel attack on a 4-digit PIN entry system

Past Training

These courses were previously presented by SecuringHardware but have been superseded or incorporated into updated courses. Secure Hardware Development was a 2-day lecture-driven course applies the Security Development Lifecycle to hardware projects including ASIC design. It will be superseded by Applied Physical Attacks and Silicon Defenses which includes the hands-on element missing from this course Software Exploitation via Hardware Exploits was developed and co-presented by SecuringHardware in 2014 and 2015, but has been superseded by a completely updated and rewritten Applied Physical Attacks on Embedded Systems. In addition, Applied Physical Attacks and Hardware Pentesting extends on the content covered in this course.