This repository contains structured notes, diagrams, checklists, extended resources, and the certificate of completion for the Architecture 4001 – x86-64 Intel Firmware Attack & Defense course.
It is designed as a community knowledge base for both Red Team and Blue Team practitioners.
- 📄
01-uefi-basics.md– UEFI boot fundamentals - 📄
02-spi-flash.md– SPI flash memory & firmware storage - 📄
03-intel-me.md– Intel Management Engine - 📄
04-smm.md– System Management Mode (SMM) - 📄
05-boot-guard-txt.md– Boot Guard & Trusted Execution - 📄
06-hardening.md– Firmware security hardening
- ✅
firmware-hardening.md– Practical firmware hardening checklist - 🛡️
platform-security-controls.md– Blue Team perspective - 🎯
threat-modeling-only.md– Red Team threat modeling
- 📑
syllabus.md– Course syllabus overview - 🛠️
roadmap.md– Suggested learning roadmap - 📖
glossary.md– Key terminology explained - 📚
references.md– Research papers & references
- 🕒
timeline.md– Evolution of firmware attacks & defenses - 📂
case-studies.md– Real-world case studies - 📘
resources.md– Extended learning resources
| Step | Screenshot |
|---|---|
| 📘 Course – Part I | ![]() |
| 📘 Course – Part II | ![]() |
| 💬 Discussions | ![]() |
| Diagram | Preview |
|---|---|
| 🔧 UEFI Boot Flow | ![]() |
🎓 Architecture 4001 – Intel Firmware Attack & Defense
Personal takeaways after completing this course:
- Strengths: The course provides deep technical coverage from hardware architecture to firmware security mechanisms, especially SMM, Intel ME, and Boot Guard.
- Challenges: The labs demand strong background knowledge in OS internals, assembly, and hardware. Without that, the learning curve feels steep.
- Practical Relevance: Extremely useful for Red Teams analyzing firmware persistence and for Blue Teams implementing platform security controls.
- Most impressive part: The LoJax rootkit case study — showing that firmware attacks are not just theory, but real-world threats.
- My own growth: I became much more confident in reading firmware specifications, applying hardening checklists, and preparing for Red Team projects.
Thành Danh – Red Team Learner & Security Researcher
-
GitHub: @ngvuthdanhh
-
Email: ngvu.thdanh@gmail.com
This project is licensed under the terms of the MIT License.
See LICENSE for details.
© 2025 ngvuthdanhh. All rights reserved.



