Embedded Hardware Acquisition & Analysis Training

Embedded Hardware Acquisition & Analysis Training will focus on processes and methodology that examiners can use to access digital data at the logical and physical levels from: IoT devices, Smart TVs, Vehicle Modules, Skimmers/Shimmers, Routers and almost every device that utilizes a main board, controller chip and some forms of flash memory. New content includes accessing, decoding and circumventing security methods and encryption keys using reverse engineering and power glitching techniques.

Description

NEW FOR 2026

 

Students will be provided with a foundation of how electronics work in relation to the techniques being used in this training. The processes taught will include tools from cost effective sources, open source resources, and commercial tools.

Students will learn how to adapt techniques like ISP, Chip-Off, Reverse Engineering and Voltage Glitching and apply it to embedded devices commonly using communication protocols such as SWD, SPI, i2C, UART and more, to exploit components and recover and decode data from various sources like embedded code and the flash memory of controller chips. Data from these sources can then be analyzed for evidence or malware artifacts.

Prerequisites

This course is open to all digital forensic professionals.

Due to the sensitive nature of our curriculum, and industry, all potential students are subject to vetting prior to enrollment. We reserve the right to refuse registration to any person that does not meet our established criteria.

Laptop Requirements


  • Windows PC with two (2) USB A ports.
  • Windows OS
  • macOS with Bootcamp Windows
  • macOS alone will not work (No Virtual Machines)
  • 8GB RAM (minimum)
  • 100GB storage (minimum)
  • You must have admin rights or have the admin password for software installation.
  • NOTE: ALL Windows updates should be done prior to class.

Course Itinerary

Abbreviated. Contact us for complete syllabus.


Day 1 Overview

  • Introduction
  • Advanced Hardware Forensics
  • Digital Communications
  • Logic Analyzer Setup and measure
  • Electronics Theory

Day 2 Overview

  • Multimeter Basics
  • Validation Ruler
  • Bluetooth
  • SPI & i2C
  • Reverse Engineering Electronic Device

Day 3 Overview

  • PuTTY
  • SPI Walkthrough
  • Chip Programmer Walkthrough
  • Researching Hardware
  • Reverse Engineering
  • Processors
  • Encryption

Day 4 Overview

  • Assembly Language
  • SWD Protocol
  • Various SWD Debuggers/Programmers
  • Demonstration – Bypass Encryption
  • Lab 2 – Bypass Encryption
  • Ghidra
  • OpenOCD & GDB
  • Lab 3 – Bypass Encryption
  • Lab 4 – Bypass Encryption

Day 5 Overview

  • CMD42 Sniffing
  • Linux User Passwords
  • Routers
  • Hands-On Router Access
  • Routers - Decrypted Files - Instructor Walkthrough
  • Glitching Techniques
  • Crowbar Glitching Lab

 

Included with Training


All students receive a certificate of completion.

Each student receives the new Teel Tech EHAAT toolkit that includes tools used in class, as well as the Teel Tech CMD42 utility for identifying locked monolith memory (SD, microSD, etc.), validation ruler and Micro Sniffer.
 
IoT Forensics Training Kit
IoT Forensics Training Kit
IoT Forensics Training Kit
IoT Forensics Training Kit

 

 

Similar courses

Join us and discover the vast amounts of data that can be recovered from automotive infotainment and navigation systems and learn how your findings can be applied to your case or investigation.

More Information

The Teel Technologies Board Level Repair course provides digital forensic investigators with a comprehensive education for troubleshooting non-bootable printed circuit boards. This course was developed with the ever-changing field of digital forensics in mind.

More Information

Our 5-day Essential Smartphone Forensics training is designed for Digital Forensic Investigators who have had some introduction to mobile forensics and would like to delve deeper OR anyone who’s encountered a situation where the tools they use are not getting them the data they need.

More Information

In this 5-day class, participants will gain an in-depth understanding of today’s most useful and effective Flasher Boxes and Bootloader utilities to unlock and acquire mobile device memory. Applicable to both high-end Android devices, such as the Samsung and similar, down to the low-end devices from manufacturers such as BLU and others that use the low-cost MediaTek and Chinese chipsets, such tools and techniques enable examiners to expand their options when addressing such devices.

More Information

In the Teel Technologies 5-Day JTAG 2.0 Forensics course, students learn the latest techniques for accessing mobile devices using the JTAG technique for data recovery and device unlocking; the latest about today’s memory, and where JTAG is useful for data recovery from mobile phones and other devices.

More Information

This intensive master class trains forensic RF propagation cell site surveyors. It offers a solid intro to cellular radio and RF surveying for newcomers and a refresher with 5G concepts for experienced attendees. The course covers networking, radio propagation, cellular tech, Wi-Fi, and 4G/5G architecture. Attendees practice 5G survey techniques using their own devices. Delivered by expert engineers with 40+ years of experience in cell site analysis and court-presented RF data.

More Information

ACE Lab PC-3000 Expert Data Recovery Training (HDD + SSD) combines four days of HDD recovery with one day of SSD recovery. Through hands-on practice with PC-3000 tools, participants learn to diagnose hardware and software issues, recover data from damaged drives, and address challenges like service area failures, translator repair, encryption, and controller-level problems building the skills to handle both HDD and SSD cases with confidence.

More Information