<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Course Review on System Overlord</title><link>https://systemoverlord.com/tags/course-review.html</link><description>Recent content in Course Review on System Overlord</description><generator>Hugo</generator><language>en-us</language><managingEditor>david@systemoverlord.com (David Tomaschik)</managingEditor><webMaster>david@systemoverlord.com (David Tomaschik)</webMaster><lastBuildDate>Sat, 17 Oct 2020 00:00:00 +0000</lastBuildDate><atom:link href="https://systemoverlord.com/tags/course-review/index.xml" rel="self" type="application/rss+xml"/><item><title>Course Review: Reverse Engineering with Ghidra</title><link>https://systemoverlord.com/2020/10/17/course-review-reverse-engineering-with-ghidra.html</link><pubDate>Sat, 17 Oct 2020 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2020/10/17/course-review-reverse-engineering-with-ghidra.html</guid><description>&lt;p&gt;If you&amp;rsquo;re a prior reader of the blog, you probably know that when I have the
opportunity to take a training class, I like to write a review of the course.
It&amp;rsquo;s often hard to find public feedback on trainings, which feels frustrating
when you&amp;rsquo;re spending thousands of dollars on that course.&lt;/p&gt;
&lt;p&gt;Last week, I took the &amp;ldquo;&lt;a href="http://infiltratecon.com/conference/training/reverse-engineering-with-ghidra.html"&gt;Reverse Engineering with
Ghidra&lt;/a&gt;&amp;rdquo;
taught by &lt;a href="https://twitter.com/0xjeremy"&gt;Jeremy Blackthorne (0xJeremy)&lt;/a&gt; of the
&lt;a href="https://www.bostoncybernetics.org/"&gt;Boston Cybernetics Institute&lt;/a&gt;. It was
ostensibly offered as part of the Infiltrate Conference, but 2020 being what it
is, there was no conference and it was just an online training. Unfortunately
for me, it was being run on East Coast time and I&amp;rsquo;m on the West Coast, so I got
to enjoy some &lt;em&gt;early&lt;/em&gt; mornings.&lt;/p&gt;</description></item><item><title>Course Review: Adversarial Attacks and Hunt Teaming</title><link>https://systemoverlord.com/2018/10/12/course-review-adversarial-attacks-and-hunt-teaming.html</link><pubDate>Fri, 12 Oct 2018 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2018/10/12/course-review-adversarial-attacks-and-hunt-teaming.html</guid><description>&lt;p&gt;At DerbyCon 8, I had the opportunity to take the &amp;ldquo;Adversarial Attacks and Hunt
Teaming&amp;rdquo; presented by Ben Ten and Larry Spohn from TrustedSec. I went into the
course hoping to get a refresher on the latest techniques for Windows domains (I
do mostly Linux, IoT &amp;amp; Web Apps at work) as well as to get a better
understanding of how hunt teaming is done. (As a Red Teamer, I feel
understanding the work done by the blue team is critical to better success and
reducing detection.)&lt;/p&gt;</description></item><item><title>Course Review: Software Defined Radio with HackRF</title><link>https://systemoverlord.com/2018/09/14/course-review-software-defined-radio-with-hackrf.html</link><pubDate>Fri, 14 Sep 2018 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2018/09/14/course-review-software-defined-radio-with-hackrf.html</guid><description>&lt;p&gt;Over the past two days, I had the opportunity to attend Michael Ossman&amp;rsquo;s course
&amp;ldquo;Software Defined Radio with HackRF&amp;rdquo; at &lt;a href="https://toorcon.org"&gt;Toorcon XX&lt;/a&gt;. This
is a course I&amp;rsquo;ve wanted to take for several years, and I&amp;rsquo;m extremely happy that
I finally had the chance. I wanted to write up a short review for others
considering taking the course.&lt;/p&gt;
&lt;h2 id="course-material"&gt;Course Material&lt;/h2&gt;
&lt;p&gt;The material in the course focuses predominantly on the basics of Software
Defined Radio and Digital Signal Processing. This includes the math necessary
to understand how the DSP handles the signal. The math is presented in a
practical, rather than academic, way. It&amp;rsquo;s not a math class, but a review of
the necessary basics, mostly of complex mathematics and a bit of trigonometry.
(My high school teachers are now vindicated. I did use that math again.)
You don&amp;rsquo;t need the math background coming in, but you do need to be prepared to
think about math during the class. Extracting meaningful information from the
ether is, it turns out, an exercise in mathematics.&lt;/p&gt;</description></item><item><title>Hardware Hacking, Reversing and Instrumentation: A Review</title><link>https://systemoverlord.com/2017/11/11/hardware-hacking-reversing-and-instrumentation-a-review.html</link><pubDate>Sat, 11 Nov 2017 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2017/11/11/hardware-hacking-reversing-and-instrumentation-a-review.html</guid><description>&lt;p&gt;I recently attended &lt;a href="https://toothless.co"&gt;Dr. Dmitry Nedospasov&lt;/a&gt;&amp;rsquo;s 4-day
&lt;a href="https://toothless.co/trainings/"&gt;&amp;ldquo;Hardware Hacking, Reversing and
Instrumentation&amp;rdquo;&lt;/a&gt; training class as part of the
&lt;a href="https://hardwaresecurity.training"&gt;HardwareSecurity.training&lt;/a&gt; event in San
Francisco. I learned a lot, and it was incredibly fun class. If you understand
the basics of hardware security and want to take it to the next level, this is
the course for you.&lt;/p&gt;
&lt;p&gt;The class predominantly focuses on the use of
&lt;a href="https://en.wikipedia.org/wiki/Field-programmable_gate_array"&gt;FPGAs&lt;/a&gt; for
breaking security in hardware devices (embedded devices, microcontrollers,
etc.). The advantage of FPGAs is that they can be used to implement arbitrary
protocols and can operate with very high timing resolution. (e.g., single clock
cycle, since it&amp;rsquo;s essentially synthesized hardware.)&lt;/p&gt;</description></item></channel></rss>