Talk With an Expert

SEC568: Product Security Penetration Testing - Safeguarding Supply Chains and Managing Third-Party Risk

SEC568Offensive Operations
  • 5 Days (Instructor-Led)
  • 30 Hours (Self-Paced)
Course created by:
Douglas McKeeIsmael Valenzuela
Douglas McKee & Ismael Valenzuela
SEC568: Product Security Penetration Testing - Safeguarding Supply Chains and Managing Third-Party Risk
Course created by:
Douglas McKeeIsmael Valenzuela
Douglas McKee & Ismael Valenzuela
  • 30 CPEs

    Apply your credits to renew your certifications

  • In-Person or Virtual

    Attend a live, instructor-led class from a location near you or virtually from anywhere

  • 20 Hands-On Lab(s)

    Apply what you learn with hands-on exercises and labs

Develop advanced product security testing skills to combat supply chain attacks and protect hardware, software, and network infrastructure.

Course Overview

SEC568 delivers advanced product security training and supply chain risk analysis. Through more than 20 hands-on lab exercises, students learn systematic methodologies for assessing security risks in third-party products. The product security course progresses from basic enumeration to deep technical analysis, covering hardware devices, mobile applications, proprietary protocols, and network traffic analysis. Using tools like Corellium, APKLab, and Scapy, students master techniques for firmware analysis, binary code examination, and protocol dissection. The course culminates in a comprehensive capstone event where students conduct a complete product security assessment on a real application.

What You’ll Learn

  • Execute comprehensive product security assessments
  • Analyze firmware and binary code for vulnerabilities
  • Dissect and evaluate proprietary network protocols
  • Build effective product security threat models
  • Conduct risk analysis using attack trees and scoring

Business Takeaways

  • Reduce supply chain attack risks across the enterprise
  • Strengthen third-party product evaluation processes
  • Improve vulnerability detection and mitigation
  • Enhance regulatory compliance capabilities
  • Build robust product security testing programs
  • Lower costs through systematic security testing
  • Develop in-house product security expertise

Course Syllabus

Explore the course syllabus below to view the full range of topics covered in SEC568: Product Security Penetration Testing - Safeguarding Supply Chains and Managing Third-Party Risk.

Section 1Product Security Penetration Testing

Introduces fundamental principles of supply chain attacks and product security testing. Focuses on online product research and basic enumeration using tools like binwalk, Corellium, and APKLab. Students learn initial methodology through hands-on exercises with the supplied virtual machines.

Topics covered

  • Product security methodology
  • Supply chain attack principles
  • Online research techniques

Labs

  • Product and vendor website reconnaissance
  • Firmware unpacking and analysis
  • APK enumeration with Corellium

Section 2Basic Enumeration, Threat Modeling, and Intro to Deep Enumeration

Covers Windows platform analysis and networking concepts using tools like Attack Surface Analyzer and Sysinternals. Introduces Exploratory Data Analysis with Python and Jupyter Notebooks for threat modeling and data visualization.

Topics covered

  • Windows enumeration techniques
  • Network analysis fundamentals
  • Threat modeling methodologies
  • Data analysis frameworks
  • Deep enumeration concepts

Labs

  • Windows system enumeration
  • Network traffic analysis with Pandas
  • Android traffic investigation
  • Data visualization with Matplotlib

Section 3Binary Code Analysis and Deep Network Analysis

Focuses on deep enumeration through binary code analysis and network protocol investigation. Students learn to use decompiler tools, analyze application updates, and manipulate network packets using Scapy.

Topics covered

  • Deep network analysis
  • Binary code examination
  • Protocol analysis
  • Scapy framework usage
  • Network traffic decryption

Labs

  • Certificate pinning bypass
  • Source code decompilation
  • Scapy protocol manipulation
  • Network artifact analysis
  • Android code analysis

Section 4Deep Network Analysis and Risk Analysis

Concludes our deep enumeration study and focuses on risk analysis. Covers protocol dissection, network fuzzing, and risk assessment using attack trees and DREAD scoring methodology.

Topics covered

  • Protocol dissection techniques
  • Fuzzing methodologies
  • Risk analysis frameworks
  • Reporting best practices
  • Vulnerability disclosure

Labs

  • Pattern enumeration analysis
  • Network traffic heartbeat detection
  • Payload analysis
  • Basic fuzzing implementation
  • Risk assessment

Section 5Capstone Event

Provides hands-on experience conducting a complete product security test on a real application, applying all concepts learned throughout the course using provided tools and cloud-based labs.

Topics covered

  • Target application analysis
  • Security testing methodology
  • Hands-on assessment practice
  • Finding documentation
  • Results discussion

Labs

  • Installation security analysis
  • Execution behavior assessment
  • Threat model development
  • Network traffic examination
  • Results documentation

Things You Need To Know

Course Schedule & Pricing

Looking for Group Purchasing Options?Contact Us
Filter by:
  • Location & instructor

    Amsterdam, NL & Virtual (live)

    Instructed by Douglas McKee
    Date & Time
    Fetching schedule..View event details
    Course price
    €7,715 EUR*Prices exclude applicable local taxes
    Registration Options
Showing 1 of 1

Benefits of Learning with SANS

Instructor teaching to a class

Get feedback from the world’s best cybersecurity experts and instructors

OnDemand Mobile App

Choose how you want to learn - online, on demand, or at our live in-person training events

Resources

Get access to our range of industry-leading courses and resources