Module 1: Communication protocols
Why are these protocols important?
Serial
SPI
Module 2: The logic Analyzer
What is a logic analyzer?
How can it be used to reverse a system?
Decoding protocols with the LA
Module 3:Different types of low-density memories
Flash and EEPROM
Communication protocols used
How they are used on embedded systems
Module 4: How to dump and modify the memories, and existing types of protections.
Getting to know your IC before removing it
Using the soldering iron to remove and resolder a memory IC
Using the hot air station to remove and resolder a memory IC
Checking for protections against modification
Finding and using Debug ports
Module 5: How to effectively look for backdoors on systems (other than "uart shells")
Basics of embedded system behavior
Production backdoors
Retail product backdoors