<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Courses on System Overlord</title><link>https://systemoverlord.com/tags/courses.html</link><description>Recent content in Courses on System Overlord</description><generator>Hugo</generator><language>en-us</language><managingEditor>david@systemoverlord.com (David Tomaschik)</managingEditor><webMaster>david@systemoverlord.com (David Tomaschik)</webMaster><lastBuildDate>Sat, 13 May 2017 00:00:00 +0000</lastBuildDate><atom:link href="https://systemoverlord.com/tags/courses/index.xml" rel="self" type="application/rss+xml"/><item><title>Applied Physical Attacks and Hardware Pentesting</title><link>https://systemoverlord.com/2017/05/13/applied-physical-attacks-and-hardware-pentesting.html</link><pubDate>Sat, 13 May 2017 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2017/05/13/applied-physical-attacks-and-hardware-pentesting.html</guid><description>&lt;p&gt;This week, I had the opportunity to take Joe Fitzpatrick&amp;rsquo;s class
&amp;ldquo;&lt;a href="https://securinghardware.com/training/pentesting/"&gt;Applied Physical Attacks and Hardware Pentesting&lt;/a&gt;&amp;rdquo;.
This was a preview of the
course he&amp;rsquo;s offering at Black Hat this summer, and so it was in a bit of an
unpolished state, but I actually enjoyed the fact that it was that way. I&amp;rsquo;ve
taken a class with Joe before, back when he and Stephen Ridley of Xipiter taught
&amp;ldquo;Software Exploitation via Hardware Exploitation&amp;rdquo;, and I&amp;rsquo;ve watched a number of
his talks at various conferences, so I had high expectations of the course, and
he didn&amp;rsquo;t disappoint.&lt;/p&gt;</description></item></channel></rss>