Back

Duration

1.5 hours

Price

Level

Intermediate

Certification

Available

Instructor

Cytheon Ltd.

Identify vulnerabilities in IoT that use Bluetooth Low Energy (BLE) and secure them

Expected learning & outcomes

  • Be able to conduct a penetration test of IoT devices that use Bluetooth Low Energy -BLE ( i.e. a lot of them !)
  • Leverage the knowledge from this course to quickly be able to penetration test IoT which run on other technologies apart from BLE ( to be covered in separate courses)
  • Understand the challenges and opportunities related to IoT cyber-security in general, as well as specifically in case of Bluetooth Low energy (BLE) IoT .

    Skills you will learn

    Cyber Security, Editorial, Fashion, Fitness, Logos, Professional, Reporting, Testing

    About this course

    This is going to be  the only course you should need to do on hacking BLE IoT ! Join N.O.W. Learn from  a published author of the book on the same topic , who has over 14 years of professional experience in cyber security !

                                 Amazon Book  : HACKING INTERNET OF THINGS: BLUETOOTH LOW ENERGY

    *30 days MONEY BACK GUARANTEE. NO QUESTIONS ASKED !

    If you wish to acquire hands-on Internet of Things Penetration testing and securing skills and be a white hat cyber security superstar, this course is for you! Learn IoT penetration testing (Bluetooth Low Energy) with example of a smart bulb and a smart lock !

    According to IHS Markit, the number of IoT devices will grow to 30.7 billion in 2020, and to 75.4 billion by 2025! IDC Forecasts Worldwide Spending on the IoT to reach $772 Billion in 2018!

    Whether it is connected automobiles, fitness watches, smart coffee machines, smart locks or even medical equipment such as insulin pumps, IoT is becoming all pervasive. In the future, there will hardly be any aspect of our lives that IoT will not touch one way or the other. Bluetooth Low Energy (BLE) is one of the popular radio protocols used by many IoT devices.

    Cyber security professionals who can test and secure IoT devices are expected to be in huge demand and can expect to get lucrative job offers given the shortage of cyber security professionals even for  “traditional” cyber security roles!





    Disclaimer

    This course is meant for cyber security professionals who wish to learn how to identify vulnerabilities in IoT devices that they are authorised to test. This course also provides an overview of key risk mitigation measures to secure the IoT devices from cyber attacks.

    In this course, the usage of the terms “hacking” or “vulnerability assessment” or “penetration testing” or “exploitation”, refers to the act of identifying vulnerabilities in a system, that one is authorised to test. The end objective being to secure the target system from cyber attacks.

    Unauthorised access to computing devices (including IoT) is a punishable offence. Therefore, don’t attempt to test the security of a system/IoT device that you don’t own or are not legally authorised to conduct an assessment on. Lastly, act responsibly and if you detect any vulnerabilities in an IoT device, promptly and securely report those to the IoT device owner and/or the vendor/manufacturer of the IoT device, as applicable in a situation. Provide all available supporting information and follow responsible vulnerability disclosure practices.

    Information in this course is distributed “as is” and is meant for educational purposes only. Whilst Cytheon Ltd and its authors/instructors have made every possible effort to ensure that the information in this course is accurate, Cytheon Ltd and its authors/instructors  do not own any responsibility whatsoever for any loss, damage, distress or disruption caused to any party, on account of any action taken or not taken on the basis of this course. Despite all the precautions taken, errors or omissions may have crept inadvertently into this course. Cytheon Ltd and its authors/instructors shall be grateful if any such error or omission is brought to their attention for possible correction.

    Trademarked names, images, and logos, may appear in this course. Instead of using a trademark symbol with every occurrence of a trademarked name, image, or a logo, the names, images and logos have been used in this course in an editorial fashion only, without any intention of trademark infringement. Use of a term in this course should not be regarded as affecting the validity of any trademark or service mark. All trademarks and brands within this course are for clarifying purposes only and are owned by the owner(s) themselves.

    LORE ADVANTAGE

    Lore delivers value at the intersection of learning, interests and skills.

    Learn from Domain Experts

    Access learning options recommended by industry experts, professionals and thought leaders.

    Search & Compare

    Quickly search, select and add learning options to your learning list.

    Personalize your feed

    Tell us more about yourself to access the latest learning options, curated just for you.