Learn how to reverse engineer a real-time operating system, look for vulnerabilities, and write exploit code.
Learning Objectives
Student will become proficient in developing firmware exploit code
Framework Connections
Specialty Areas
- Exploitation Analysis
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.