IoT-Architecture, Functional-Architecture, Layered model, Internet of Things Attack surface, Applied Physical Attacks-Recon and Passive Analysis, Recognizing and communicating hardware impact, Sourcing documentation and tools, Reading datasheets and inferring system functionality, Threat Modeling and System Analysis, Threat modeling when hardware is in scope, Dynamic analysis, Analyzing interconnects, Analyzing an unknown protocol, Firmware vulnerability analysis and exploitation. Static vs Dynamic analysis and tools, Dynamic analysis in-circuit vs emulator, Tooling for dynamic analysis, Reverse engineering firmware, Firmware reversing using emulation.