Courses

At You Gotta Hack That, we offer a comprehensive suite of advanced technical training courses specifically designed to empower cybersecurity professionals with the specialised skills needed to secure IoT and OT environments.

Explore our courses

Our courses are crafted by leading experts who bring extensive hands-on experience and a deep understanding of the unique challenges within these domains. Whether you’re looking to enhance your foundational knowledge or master advanced techniques, our training programs deliver the practical expertise required to excel in the field.

Our courses

Not-yet-released course modules

The Certified Embedded System Hacker course is new in 2024 and not all modules are currently released. We’re excited that several more modules are currently in development, each designed to get into the finer details of embedded system hacking.

 

What’s Coming Soon

Our upcoming modules will dive deep into advanced topics that are critical for cybersecurity professionals aiming to stay at the forefront of the industry. These modules are designed with the same rigorous standards as our existing offerings, ensuring that you receive top-quality, hands-on training that prepares you for real-world scenarios.

1. Firmware Emulation and Peripheral Fakery Master the art of emulating firmware and faking peripherals to create controlled environments for testing and exploiting devices. This module will provide the tools and techniques necessary to simulate various hardware interactions, enhancing your ability to assess and secure embedded systems.

2. Glitching and Power Analysis Delve into advanced hardware hacking techniques with our upcoming module on glitching and power analysis. Learn how to exploit electrical vulnerabilities in devices, gaining a deeper understanding of how to protect against these sophisticated attacks.

3. Hacking the Wider Embedded Ecosystem Expand your expertise beyond individual devices and explore the security of technologies that enable interconnectivity such as Message Queueing services and Identity Providers. This module will cover the broader embedded ecosystem, focusing on the interactions between devices and the unique security challenges they present.

4. RF Hacking: The Unusual, The Weird, and The Wonderful Push the boundaries of wireless hacking with this module, which explores obscure and unconventional RF technologies. Whether it’s niche communication protocols or unexpected uses of RF, this course will broaden your hacking toolkit and deepen your understanding of the wireless landscape.

5. Forensics with Ubiquitous Tech Enhance your forensic skills with a focus on the ubiquitous technologies that permeate our daily lives. This module will equip you with the knowledge to perform detailed forensic analysis on a variety of devices, from household gadgets to industrial systems.

Stay Ahead of the Curve

Don’t miss the opportunity to be among the first to access these cutting-edge modules. Be the first to know when these modules launch by joining our waiting list today. Simply sign up here to receive exclusive updates and early bird pricing when you agree to be one of our beta testers!

Beta testing is easy – you know those feedback forms you get whenever you go on a course?  Well its one of those, but we also get you involved in a group discussion each day for 15 extra minutes to talk about the good bits the bad bits and the interesting ideas you’ve had for making it more awesome.  You also get eternal gratitude and your name in the credits.  How cool…!

Register interest or Get in touch

"*" indicates required fields

Submit