Issued to
Ross Marks
Want to report a typo or a mistake?
Credential Verification
Issue date: September 12, 2025
ID: bbb7d304-238b-41ff-a4e6-532b1fe05f26
Issued by
WHID - We Hack In Disguise 🇮🇹
WHID – We Hack In Disguise is an Italy-based security boutique (est. 2017) that R&D Internet of Offensive Things hardware implants and delivers flagship hands-on hardware security trainings to corporate customers and law enforcement agencies.
Type
Certification
Level
Professional
Format
Hybrid
Price
Paid
Description
The Offensive Hardware Hacking Training is a hands-on course designed to fulfill the skills gap that in the recent years emerged within the InfoSec scene in respect of the (I)IoT landscape. In it, students will be able to gather the needed theoretical knowledge and practical skills to engage with confidence hardware security audits involving those devices, that started to flood both consumer and corporate markets. The course is structured to be accessible to both junior and senior security personnel: it goes from a generic panoramic of the theory behind electronics, protocols, memories, microprocessors & tools-of-the-trade; then proceeds deeper into the topics by reviewing various TTPs.
Skills
Embedded security
Hardware Hacking
IoT Security
Soldering
PCB Reverse Engineering
OWASP Top10 IoT
OWASP ISVS
CVSS Risk Calculation
Hardware Threat Modeling
Secure Hardware Development Lifecycle
Firmware Analysis
Firmware Emulation
Firmware Differential Analysis
Electronics
Earning Criteria
Assignment
The student has to complete all the practical hands-on exercises and homeworks given, proving is able to properly assess the security of the given IoT/Embedded DUT (Device Under Test).
Watching
The students has to succesfully complete the 15+ hours of video lessons splitted in theoretical and practical parts.
Test
How is structured the Exam? - 45 min video call with the examiner - 5 Questions about Theory (UART, JTAG, SWD, SPI, I2C, NAND, Basics of Electronics, OWASP IoT Top10, ISVS, etc.) - 5 Questions about Practice (e.g. Hardware Security Testing Workflow, eventual CVEs or Blogpost or Projects you worked on, aibility to assemble and flash Burtleina-Board, etc.) - Each question is 5 points. For a total of 50 points. - Passing Score 35 points