Hacking IoT (Internet of Things) - Module 1

Identify vulnerabilities in IoT that use Bluetooth Low Energy (BLE) and secure them



About Course


This course is meant for cyber security professionals who wish to learn how to identify vulnerabilities in IoT devices that they are authorised to test. This course also provides an overview of key risk mitigation measures to secure the IoT devices from cyber attacks.

 

In this course, the usage of the terms “hacking” or “vulnerability assessment” or “penetration testing” or “exploitation”, refers to the act of identifying vulnerabilities in a system, that one is authorised to test. The end objective being to secure the target system from cyber attacks.

Who this course is for:
  • Everyone who wants to enhance their cyber security skill beyond basic wireless, windows and *nix hacking and move to a cutting edge security area which is IoT Penetration Testing.
  • Every cyber security enthusiast or a professional who wants to stand out from his/her peers in the job market, university or in the organisation they work in.




Highlights

Comments