<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://learn.securinghardware.com/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/uart/</loc><lastmod>2020-09-14T03:00:38-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/spi/</loc><lastmod>2020-09-14T03:00:38-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/jtag/</loc><lastmod>2020-09-14T03:00:38-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/lessons/advanced-hardware-moved-to-apa2/</loc><lastmod>2021-11-01T16:25:24-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/firmware/</loc><lastmod>2020-09-14T03:00:38-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/appendix-a-additional-topics/</loc><lastmod>2020-09-14T03:00:38-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/equipment/</loc><lastmod>2020-09-14T03:00:39-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-on-a-raspberry-pi/lessons/rpi-introduction/</loc><lastmod>2020-09-10T02:10:04-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-on-a-raspberry-pi/lessons/communicating-over-a-console/</loc><lastmod>2020-09-10T02:10:04-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-on-a-raspberry-pi/lessons/rpi-analyzing-firmware/</loc><lastmod>2020-09-10T02:10:04-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-on-a-raspberry-pi/lessons/rpi-accessing-debug-interfaces/</loc><lastmod>2020-09-10T02:10:04-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-with-tigard/lessons/overview/</loc><lastmod>2021-03-24T15:19:40-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-with-tigard/lessons/uart-2/</loc><lastmod>2021-03-24T16:00:16-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-with-tigard/lessons/spi-2/</loc><lastmod>2021-03-24T16:15:53-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-with-tigard/lessons/i2c/</loc><lastmod>2021-07-13T12:14:49-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-with-tigard/lessons/jtag-wip/</loc><lastmod>2021-03-26T11:22:41-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-with-tigard/lessons/swd-wip/</loc><lastmod>2021-03-26T11:22:43-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-with-tigard/lessons/debugging/</loc><lastmod>2021-03-26T11:22:11-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-with-tigard/lessons/la/</loc><lastmod>2021-03-26T11:18:57-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/introduction/</loc><lastmod>2020-09-14T03:00:38-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-on-a-raspberry-pi/lessons/another-bit-of-information-about-equipment-and-preparation/</loc><lastmod>2020-09-10T02:10:04-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/lessons/practical-excercises-moved-to-apa2/</loc><lastmod>2021-11-01T16:25:29-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/lessons/recon-and-passive-analysis/</loc><lastmod>2021-06-08T15:34:18-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-with-tigard/lessons/bonus-ice40-programming/</loc><lastmod>2021-03-26T11:23:27-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-with-tigard/lessons/bonus-avr-isp-programming/</loc><lastmod>2021-03-26T11:23:48-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-with-tigard/lessons/bonus-bit-banging-ws2182-leds/</loc><lastmod>2021-03-26T11:58:48-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/lessons/threat-modelling-and-system-analysis/</loc><lastmod>2021-06-08T15:41:44-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/lessons/hardware-vulnerability-analysis-and-exploitation/</loc><lastmod>2021-06-08T15:41:57-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/lessons/firmware-vulnerability-analysis-and-exploitation/</loc><lastmod>2021-06-08T15:42:24-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/lessons/advanced-jtag/</loc><lastmod>2021-06-08T16:26:05-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-2/lessons/what-is-hardware-pentesting/</loc><lastmod>2021-08-19T11:32:20-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/lessons/the-hardware-pentesting-process/</loc><lastmod>2021-08-19T12:55:33-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-2/lessons/case-study-1-solid-state-drive/</loc><lastmod>2021-08-19T11:33:38-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-2/lessons/case-study-2-smart-thermostat/</loc><lastmod>2025-03-17T23:54:17-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-5/lessons/usb/</loc><lastmod>2021-09-15T11:42:36-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-5/lessons/pcie/</loc><lastmod>2021-09-15T11:42:45-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-5/lessons/smbus-and-iic/</loc><lastmod>2021-09-15T11:43:03-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-5/lessons/jtag-and-debug/</loc><lastmod>2021-09-15T11:43:13-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-5/lessons/bios-uefi-and-spi/</loc><lastmod>2021-09-15T11:43:30-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-5/lessons/introduction-2/</loc><lastmod>2021-09-15T11:58:02-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/lessons/appendix-equipment/</loc><lastmod>2021-11-03T10:43:57-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-2/lessons/case-study-2-smart-thermostat-2/</loc><lastmod>2025-03-17T23:53:32-07:00</lastmod></url></urlset>
