Identify vulnerabilities in IoT that use Bluetooth Low Energy (BLE) and secure them
This course is meant for cyber security professionals who wish to learn how to identify vulnerabilities in IoT devices that they are authorised to test. This course also provides an overview of key risk mitigation measures to secure the IoT devices from cyber attacks.
In this course, the usage of the terms “hacking” or “vulnerability assessment” or “penetration testing” or “exploitation”, refers to the act of identifying vulnerabilities in a system, that one is authorised to test. The end objective being to secure the target system from cyber attacks.