As someone who began in embedded engineering and transitioned into cybersecurity, I’ve always been interested in that gray space where hardware meets software. When I came across the Certified Hardware Hacker (CH2) certification from We Hack In Disguise (WHID), it felt like a solid way to expand my skills into hardware hacking. The course promised a deep dive into embedded and IoT device security with hands-on labs, real-world tooling, and a technical curriculum. Now that I’ve completed the training and passed the certification, here’s my review for those considering it.
A Look Inside the Training
The CH2 training is built around a self-paced, lab-heavy approach. It blends theory and practice with structured content, walkthroughs, and exercises that you can follow at your own speed. From the start, it was clear this wasn’t just another set of slides and multiple-choice questions. The labs drive the learning process, and that’s where most of the value lies.
Topics covered include:
Dumping memory (eMMC, NAND)
Debug protocols: UART, JTAG, I2C, SPI, SWD
Soldering and desoldering techniques
PCB reverse engineering
Fault injection fundamentals
Emulating embedded firmware (MIPS/ARM)
Threat modeling for embedded and IoT devices
There’s also a full section dedicated to practical electronics, which even for someone with prior experience was a useful refresher.
Who This Course is (and Isn’t) For
CH2 is best suited for:
Security professionals looking to explore embedded/IoT targets
Penetration testers branching out into hardware
Researchers with some background in Linux and tooling
If you’re already familiar with terminal work, basic electronics, and reverse engineering concepts, you’ll likely find the pace appropriate. However, this isn’t designed for absolute beginners or those unfamiliar with Linux. There’s an expectation that you can pick up new tools quickly and troubleshoot on your own.
Coming from an embedded engineering background, I found the earlier modules a bit elementary, but the later stages (especially memory extraction , firmware emulation and fault injection) were rewarding and practical.
What Worked Well
Lab-First Approach: Nearly every theoretical concept is tied to a hands-on exercise. That alone sets CH2 apart from many “watch-and-forget” security courses.
Self-Paced with Depth: The material is dense but digestible. You can go at your own speed and still walk away with tangible skills.
Focus on Practical Tools and Methods: No vendor lock-in or overly abstract ideas—just real tools used in real audits.
Clear Technical Progression: You move from basic soldering to advanced attack surfaces in a logical way.
Where It Could Improve
Limited Community Interaction: While there is a student community, it’s relatively quiet—likely due to the niche nature of hardware hacking and the course’s early stage. It doesn’t have the scale or activity of larger platforms like OffSec or HTB. That said, Luca (the instructor) is responsive and helpful, providing direct support when needed, especially around exercises and questions.
Cost Considerations: At around $2000, it's a significant investment. Worth it if you're serious, but not exactly entry-level pricing.
Additionally, I would have liked to see more advanced coverage of topics like fault injection and power analysis. A deeper dive with practical examples in those areas would take the course to another level.
The CH2 Certification Exam Experience
The certification exam is a live, 45–60-minute video call. It’s a mix of technical questioning and practical discussion, led by the course creator himself. It felt more like a peer-to-peer conversation than a test, which I appreciated.
You’re asked to explain key concepts, show understanding of the labs, and answer technical questions based on the material. There’s no trickery—if you’ve done the work, you’ll be well-prepared. I found the conversation engaging and informative, and we even ended up discussing some broader security topics by the end.
The cert doesn’t expire and doesn’t require renewals. That’s a small but appreciated detail.
Final Verdict: Is CH2 Worth It?
For anyone with a background in embedded systems or pentesting, CH2 is a worthwhile investment. It provides a structured path into hardware security that balances practical labs with theoretical depth.
If you're looking to transition into IoT/embedded device hacking, this course will give you the foundations and tools to begin real-world work. It's not flashy or marketing-heavy—it’s built for people who want to learn by doing.
Overall, CH2 delivers where it counts: hands-on skills, real tools, and a clear learning path.