window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-SSTZC704MH');

Courses

At You Gotta Hack That, we offer a comprehensive suite of advanced technical training courses specifically designed to empower cybersecurity professionals with the specialised skills needed to secure IoT and OT environments.

Explore our course modules

Our modules are crafted by leading experts who bring extensive hands-on experience and a deep understanding of the unique challenges within these domains. Whether you’re looking to enhance your foundational knowledge or master advanced techniques, our training programs deliver the practical expertise required to excel in the field.

Our courses

Want more details?

We know that going on a course is a big thing.  Not everyone has the spare time, or maybe the training budget to splash around. So when you do choose a module, you want to know its right for you.  That’s why we have put together some extra details to help:

These should get you started, but if you still have questions, please get in touch.

What’s coming soon

Our upcoming modules will dive deep into advanced topics that are critical for cybersecurity professionals aiming to stay at the forefront of the industry. These modules are designed with the same rigorous standards as our existing offerings, ensuring that you receive top-quality, hands-on training that prepares you for real-world scenarios. 

Not-quite-released course modules

The Certified Embedded System Hacker course is new in 2024 and not all modules are currently released. We’re excited that several more modules are currently in development, each designed to get into the finer details of embedded system hacking. These are all expected to launch in 2025

1. Firmware Emulation and Peripheral Fakery

Master the art of emulating firmware and faking peripherals to create controlled environments for testing and exploiting devices. This module will provide the tools and techniques necessary to simulate various hardware interactions, enhancing your ability to assess and secure embedded systems.

  1. 2. Glitching and Power Analysis

Delve into advanced hardware hacking techniques with our upcoming module on glitching and power analysis. Learn how to exploit electrical vulnerabilities in devices, gaining a deeper understanding of how to protect against these sophisticated attacks.

3. RF Hacking: The Unusual, The Weird, and The Wonderful

Push the boundaries of wireless hacking with this module, which explores obscure and unconventional RF technologies. Whether it’s niche communication protocols or unexpected uses of RF, this course will broaden your hacking toolkit and deepen your understanding of the wireless landscape.

4. Forensics with Ubiquitous Tech

Enhance your forensic skills with a focus on the ubiquitous technologies that permeate our daily lives. This module will equip you with the knowledge to perform detailed forensic analysis on a variety of devices, from household gadgets to industrial systems.

The full course

In total the full course will be 12 modules long.  It will also include the below modules that will likely go live in 2026.

1. Operational Cyber Security and Foundational Embedded System Knowledge

Building a strong foundation in embedded systems and operational cybersecurity, essential for understanding and securing modern IoT and OT environments.

2. Hacking the Wider Embedded Ecosystem

Expand your expertise beyond individual devices and explore the security of technologies that enable interconnectivity such as Message Queueing services and Identity Providers.

3. Firmware Extraction Mastery

Master the techniques for extracting firmware from a wide range of devices and approaches.

4. Software Reverse Engineering (SRE)

Gain deep insights into software reverse engineering, learning how to deconstruct and analyse software to uncover vulnerabilities and understand its inner workings.

5. Firmware Reverse Engineering (FRE)

A module dedicated to reverse engineering firmware and learning the skills necessary to dissect, understand, and secure the code that drives embedded devices.

6. RF Hacking: Bluetooth, ZigBee, and NFC

Explore the vulnerabilities in wireless communication protocols such as Bluetooth, ZigBee, and NFC, and learn how to exploit and these technologies.

Stay Ahead of the Curve

Don’t miss the opportunity to be among the first to access these cutting-edge modules. Be the first to know when these modules launch by joining our waiting list today. Simply sign up here to receive exclusive updates and early bird pricing when you agree to be one of our beta testers!

Beta testing is easy – you know those feedback forms you get whenever you go on a course?  Well its one of those, but we also get you involved in a group discussion each day for 15 extra minutes to talk about the good bits the bad bits and the interesting ideas you’ve had for making it more awesome.  You also get eternal gratitude and your name in the credits.  How cool…!

Register interest or Get in touch

"*" indicates required fields

Submit
This field is for validation purposes and should be left unchanged.