<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Training on System Overlord</title><link>https://systemoverlord.com/tags/training.html</link><description>Recent content in Training on System Overlord</description><generator>Hugo</generator><language>en-us</language><managingEditor>david@systemoverlord.com (David Tomaschik)</managingEditor><webMaster>david@systemoverlord.com (David Tomaschik)</webMaster><lastBuildDate>Wed, 08 Apr 2020 00:00:00 +0000</lastBuildDate><atom:link href="https://systemoverlord.com/tags/training/index.xml" rel="self" type="application/rss+xml"/><item><title>Security 101: Learning From Home</title><link>https://systemoverlord.com/2020/04/08/security-101-learning-from-home.html</link><pubDate>Wed, 08 Apr 2020 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2020/04/08/security-101-learning-from-home.html</guid><description>&lt;p&gt;Outside, there&amp;rsquo;s a pandemic. We&amp;rsquo;re being asked to stay indoors, shelter in
place, and avoid social contact. Conferences are cancelled, live trainings are
out of the question. Some businesses are closing (hopefully temporarily) and
there are unfortunate layoffs and furloughs across the board. It&amp;rsquo;s a tough
time.&lt;/p&gt;
&lt;p&gt;Rather than dwell on the negative, focusing on something else can help you get
through this mentally. Learning something or growing your skills can both help
take away from the anxiety of the situation and also help you come out of this a
better person. Whether you&amp;rsquo;re just getting started in security or looking to
advance your career, or just looking to become more security-aware as an
individual, there are some great options for learning from home. My lists below
are by no means comprehensive &amp;ndash; there&amp;rsquo;s more content than I can shake a stick
at. However, these are intended to be good for beginners and have a diverse set
of content. If you know of something I should have included, please reach out.&lt;/p&gt;</description></item><item><title>Course Review: Applied Hardware Attacks: Rapid Prototying &amp; Hardware Implants</title><link>https://systemoverlord.com/2019/03/20/course-review-applied-hardware-attacks-rapid-prototying-hardware-implants.html</link><pubDate>Wed, 20 Mar 2019 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2019/03/20/course-review-applied-hardware-attacks-rapid-prototying-hardware-implants.html</guid><description>&lt;p&gt;Over the past 4 days, I had the opportunity to take two hardware security
classes taught by &lt;a href="https://securinghardware.com/"&gt;Joe Fitzpatrick&lt;/a&gt;(&lt;a href="https://twitter.com/securelyfitz"&gt;@securelyfitz&lt;/a&gt;)
along with &lt;a href="https://twitter.com/_mg_"&gt;@_MG_&lt;/a&gt;. Both courses are part of the
&amp;ldquo;Applied Hardware Attacks&amp;rdquo; series of courses taught by Joe. The first course,
&amp;ldquo;Rapid Prototyping&amp;rdquo;, is focused on using 3D printers and PCB mills to build
interfaces to hardware systems. The second course, aptly named &amp;ldquo;Hardware
Implants&amp;rdquo; applies these skills to build hardware implants to perform attacks on
hardware systems. Both courses are
&lt;a href="https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies"&gt;very timely&lt;/a&gt;
and informative, as well as a lot of fun.&lt;/p&gt;</description></item><item><title>Certifications Aren't as Big a Deal as You Think</title><link>https://systemoverlord.com/2019/03/15/certifications-arent-as-big-a-deal-as-you-think.html</link><pubDate>Fri, 15 Mar 2019 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2019/03/15/certifications-arent-as-big-a-deal-as-you-think.html</guid><description>&lt;p&gt;For some reason, security certifications get discussed a lot, particularly in
forums catering to those newer to the industry. (See, for example,
&lt;a href="https://reddit.com/r/asknetsec"&gt;/r/asknetsec&lt;/a&gt;.) Now I&amp;rsquo;m not talking about
business certifications (ISO, etc.) but personal certifications that allegedly
demonstrate some kind of skill on behalf of the individual. There seems to be a
lot of focus on certifications that you &amp;ldquo;need&amp;rdquo; or that will land you your dream
security job.&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;m going to make the claim that you should stop worrying about certifications
and instead spend your time learning things that will help you in the real
world &amp;ndash; or better yet, actually applying your skills in the real world. There
are likely some people who will strongly disagree with me, and that&amp;rsquo;s good, but
I want it to be a discussion that people think about, instead of just assuming
certifications are some kind of magic wand.&lt;/p&gt;</description></item><item><title>Course Review: Adversarial Attacks and Hunt Teaming</title><link>https://systemoverlord.com/2018/10/12/course-review-adversarial-attacks-and-hunt-teaming.html</link><pubDate>Fri, 12 Oct 2018 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2018/10/12/course-review-adversarial-attacks-and-hunt-teaming.html</guid><description>&lt;p&gt;At DerbyCon 8, I had the opportunity to take the &amp;ldquo;Adversarial Attacks and Hunt
Teaming&amp;rdquo; presented by Ben Ten and Larry Spohn from TrustedSec. I went into the
course hoping to get a refresher on the latest techniques for Windows domains (I
do mostly Linux, IoT &amp;amp; Web Apps at work) as well as to get a better
understanding of how hunt teaming is done. (As a Red Teamer, I feel
understanding the work done by the blue team is critical to better success and
reducing detection.)&lt;/p&gt;</description></item><item><title>Course Review: Software Defined Radio with HackRF</title><link>https://systemoverlord.com/2018/09/14/course-review-software-defined-radio-with-hackrf.html</link><pubDate>Fri, 14 Sep 2018 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2018/09/14/course-review-software-defined-radio-with-hackrf.html</guid><description>&lt;p&gt;Over the past two days, I had the opportunity to attend Michael Ossman&amp;rsquo;s course
&amp;ldquo;Software Defined Radio with HackRF&amp;rdquo; at &lt;a href="https://toorcon.org"&gt;Toorcon XX&lt;/a&gt;. This
is a course I&amp;rsquo;ve wanted to take for several years, and I&amp;rsquo;m extremely happy that
I finally had the chance. I wanted to write up a short review for others
considering taking the course.&lt;/p&gt;
&lt;h2 id="course-material"&gt;Course Material&lt;/h2&gt;
&lt;p&gt;The material in the course focuses predominantly on the basics of Software
Defined Radio and Digital Signal Processing. This includes the math necessary
to understand how the DSP handles the signal. The math is presented in a
practical, rather than academic, way. It&amp;rsquo;s not a math class, but a review of
the necessary basics, mostly of complex mathematics and a bit of trigonometry.
(My high school teachers are now vindicated. I did use that math again.)
You don&amp;rsquo;t need the math background coming in, but you do need to be prepared to
think about math during the class. Extracting meaningful information from the
ether is, it turns out, an exercise in mathematics.&lt;/p&gt;</description></item><item><title>Hardware Hacking, Reversing and Instrumentation: A Review</title><link>https://systemoverlord.com/2017/11/11/hardware-hacking-reversing-and-instrumentation-a-review.html</link><pubDate>Sat, 11 Nov 2017 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2017/11/11/hardware-hacking-reversing-and-instrumentation-a-review.html</guid><description>&lt;p&gt;I recently attended &lt;a href="https://toothless.co"&gt;Dr. Dmitry Nedospasov&lt;/a&gt;&amp;rsquo;s 4-day
&lt;a href="https://toothless.co/trainings/"&gt;&amp;ldquo;Hardware Hacking, Reversing and
Instrumentation&amp;rdquo;&lt;/a&gt; training class as part of the
&lt;a href="https://hardwaresecurity.training"&gt;HardwareSecurity.training&lt;/a&gt; event in San
Francisco. I learned a lot, and it was incredibly fun class. If you understand
the basics of hardware security and want to take it to the next level, this is
the course for you.&lt;/p&gt;
&lt;p&gt;The class predominantly focuses on the use of
&lt;a href="https://en.wikipedia.org/wiki/Field-programmable_gate_array"&gt;FPGAs&lt;/a&gt; for
breaking security in hardware devices (embedded devices, microcontrollers,
etc.). The advantage of FPGAs is that they can be used to implement arbitrary
protocols and can operate with very high timing resolution. (e.g., single clock
cycle, since it&amp;rsquo;s essentially synthesized hardware.)&lt;/p&gt;</description></item><item><title>Building a Home Lab for Offensive Security &amp; Security Research</title><link>https://systemoverlord.com/2017/10/24/building-a-home-lab-for-offensive-security-basics.html</link><pubDate>Tue, 24 Oct 2017 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2017/10/24/building-a-home-lab-for-offensive-security-basics.html</guid><description>&lt;p&gt;When I wrote my &lt;a href="https://systemoverlord.com/2017/09/18/getting-started-in-offensive-security.html"&gt;&amp;ldquo;getting started&amp;rdquo; post&lt;/a&gt;
on offensive security, I promised I&amp;rsquo;d write about building a lab you can use to
practice your skillset. It&amp;rsquo;s taken a little while for me to get to it, but I&amp;rsquo;m
finally trying to deliver.&lt;/p&gt;
&lt;p&gt;Much like the post on getting started, I&amp;rsquo;m not claiming to have all the answers.
I&amp;rsquo;ll again be focusing on an environment that helps you build a focus in the
areas I most work in &amp;ndash; penetration testing, black box application security,
and red teaming. (And if you&amp;rsquo;re wondering about the difference between a
penetration test and red team, there will be a post for that too &amp;ndash; I promise
they&amp;rsquo;re very different.)&lt;/p&gt;</description></item></channel></rss>