Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Software Development Tools No-Code Development
Business
Entrepreneurship Communication Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certifications Network & Security Hardware Operating Systems & Servers Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Paid Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement & Gardening Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition & Diet Yoga Mental Health Martial Arts & Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Learning Teacher Training Test Prep Other Teaching & Academics
Web Development JavaScript React Angular CSS Node.Js PHP HTML5 Vue JS
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Amazon AWS Cisco CCNA CompTIA Security+ Microsoft AZ-900
Microsoft Power BI SQL Tableau Data Modeling Business Analysis Business Intelligence MySQL Qlik Sense Data Analysis
Unity Unreal Engine Game Development Fundamentals C# 3D Game Development C++ Unreal Engine Blueprints 2D Game Development Mobile Game Development
Google Flutter iOS Development Android Development Swift React Native Dart (programming language) Kotlin Mobile App Development SwiftUI
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting Canva InDesign Character Design Procreate Digital Illustration App
Life Coach Training Neuro-Linguistic Programming Personal Development Personal Transformation Life Purpose Mindfulness Sound Therapy Meditation Coaching
Business Fundamentals Entrepreneurship Fundamentals Freelancing Business Strategy Startup Business Plan Online Business Blogging Leadership
Digital Marketing Social Media Marketing Marketing Strategy Internet Marketing Google Analytics Email Marketing Copywriting YouTube Marketing Startup

IT & SoftwareNetwork & SecurityEthical Hacking

Hacking IoT (Internet of Things) - Module 1

Identify vulnerabilities in IoT that use Bluetooth Low Energy (BLE) and secure them
Rating: 3.5 out of 53.5 (54 ratings)
432 students
Created by Cytheon Ltd.
Last updated 5/2018
English

What you'll learn

  • Be able to conduct a penetration test of IoT devices that use Bluetooth Low Energy -BLE ( i.e. a lot of them !)
  • Leverage the knowledge from this course to quickly be able to penetration test IoT which run on other technologies apart from BLE ( to be covered in separate courses)
  • Understand the challenges and opportunities related to IoT cyber-security in general, as well as specifically in case of Bluetooth Low energy (BLE) IoT .

Requirements

  • Basic knowledge of using Linux and Windows
  • Basic knowledge of networking concepts
  • A cheap bluetooth adapter dongle and optionally , a bluetooth low energy packet sniffing hardware ( only if you wish to try one hands-on lesson on passive/blackbox sniffing)

Description

This is going to be  the only course you should need to do on hacking BLE IoT ! Join N.O.W. Learn from  a published author of the book on the same topic , who has over 14 years of professional experience in cyber security !

                             Amazon Book  : HACKING INTERNET OF THINGS: BLUETOOTH LOW ENERGY

*30 days MONEY BACK GUARANTEE. NO QUESTIONS ASKED !

If you wish to acquire hands-on Internet of Things Penetration testing and securing skills and be a white hat cyber security superstar, this course is for you! Learn IoT penetration testing (Bluetooth Low Energy) with example of a smart bulb and a smart lock !

According to IHS Markit, the number of IoT devices will grow to 30.7 billion in 2020, and to 75.4 billion by 2025! IDC Forecasts Worldwide Spending on the IoT to reach $772 Billion in 2018!

Whether it is connected automobiles, fitness watches, smart coffee machines, smart locks or even medical equipment such as insulin pumps, IoT is becoming all pervasive. In the future, there will hardly be any aspect of our lives that IoT will not touch one way or the other. Bluetooth Low Energy (BLE) is one of the popular radio protocols used by many IoT devices.

Cyber security professionals who can test and secure IoT devices are expected to be in huge demand and can expect to get lucrative job offers given the shortage of cyber security professionals even for  “traditional” cyber security roles!





Disclaimer

This course is meant for cyber security professionals who wish to learn how to identify vulnerabilities in IoT devices that they are authorised to test. This course also provides an overview of key risk mitigation measures to secure the IoT devices from cyber attacks.

In this course, the usage of the terms “hacking” or “vulnerability assessment” or “penetration testing” or “exploitation”, refers to the act of identifying vulnerabilities in a system, that one is authorised to test. The end objective being to secure the target system from cyber attacks.

Unauthorised access to computing devices (including IoT) is a punishable offence. Therefore, don’t attempt to test the security of a system/IoT device that you don’t own or are not legally authorised to conduct an assessment on. Lastly, act responsibly and if you detect any vulnerabilities in an IoT device, promptly and securely report those to the IoT device owner and/or the vendor/manufacturer of the IoT device, as applicable in a situation. Provide all available supporting information and follow responsible vulnerability disclosure practices.

Information in this course is distributed “as is” and is meant for educational purposes only. Whilst Cytheon Ltd and its authors/instructors have made every possible effort to ensure that the information in this course is accurate, Cytheon Ltd and its authors/instructors  do not own any responsibility whatsoever for any loss, damage, distress or disruption caused to any party, on account of any action taken or not taken on the basis of this course. Despite all the precautions taken, errors or omissions may have crept inadvertently into this course. Cytheon Ltd and its authors/instructors shall be grateful if any such error or omission is brought to their attention for possible correction.

Trademarked names, images, and logos, may appear in this course. Instead of using a trademark symbol with every occurrence of a trademarked name, image, or a logo, the names, images and logos have been used in this course in an editorial fashion only, without any intention of trademark infringement. Use of a term in this course should not be regarded as affecting the validity of any trademark or service mark. All trademarks and brands within this course are for clarifying purposes only and are owned by the owner(s) themselves.

Who this course is for:

  • Everyone who wants to enhance their cyber security skill beyond basic wireless, windows and *nix hacking and move to a cutting edge security area which is IoT Penetration Testing.
  • Every cyber security enthusiast or a professional who wants to stand out from his/her peers in the job market, university or in the organisation they work in.

Instructor

Cytheon Ltd.
Founded by Cyber security professional with 14 years of professional experience in helping organisations enhance cyber risk management
Cytheon Ltd.
  • 3.5 Instructor Rating
  • 54 Reviews
  • 545 Students
  • 1 Course

Cytheon Ltd is a registered company in the United Kingdom and aims to provide cutting-edge cyber security training and publishing services. 

Shash (Shashank) Pandey M.B.A, CISSP, CEH, CCSK, is a cyber security advisor, author and speaker based in London, UK. He is also the Founder and Director at Cytheon Ltd, which aims to provide cutting-edge cyber security advisory, training and publishing services. Shashank holds an MBA (University of Cambridge, UK), a Bachelor’s degree in information technology and multiple industry certifications in cyber security, such as CISSP and CCSK. He has over 14 years of professional experience in helping organisations enhance their cyber risk management maturity. He has worked in all three lines of defence roles in his career and in organisations that include a big 4 professional services firm and financial services organisations. His articles and proof of concept codes (to demonstrate vulnerabilities) have been published on major security portals. 


Top companies choose Udemy Business to build in-demand career skills.
NasdaqVolkswagenBoxNetAppEventbrite
  • Udemy Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Investors
  • Impressum Kontakt
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Accessibility statement
Udemy
© 2022 Udemy, Inc.