This course provided a deep dive into the security of embedded systems, which make up 98% of all microprocessors in use today. Designed to mirror real-world adversary behavior, the course covered both hardware and software exploitation techniques commonly used to target devices like routers, IoT devices, industrial controllers, and other embedded platforms.
This course bridged hardware and software security, strengthening my skills in reverse engineering, firmware analysis, and ARM-based exploit development. It enhanced my ability to think like an adversary targeting embedded platforms and design countermeasures to defend them.