Hacking IoT (Internet of Things) - Module 1
What you'll learn
- Be able to conduct a penetration test of IoT devices that use Bluetooth Low Energy -BLE ( i.e. a lot of them !)
- Leverage the knowledge from this course to quickly be able to penetration test IoT which run on other technologies apart from BLE ( to be covered in separate courses)
- Understand the challenges and opportunities related to IoT cyber-security in general, as well as specifically in case of Bluetooth Low energy (BLE) IoT .
- Basic knowledge of using Linux and Windows
- Basic knowledge of networking concepts
- A cheap bluetooth adapter dongle and optionally , a bluetooth low energy packet sniffing hardware ( only if you wish to try one hands-on lesson on passive/blackbox sniffing)
This is going to be the only course you should need to do on hacking BLE IoT ! Join N.O.W. Learn from a published author of the book on the same topic , who has over 14 years of professional experience in cyber security !
Amazon Book : HACKING INTERNET OF THINGS: BLUETOOTH LOW ENERGY
*30 days MONEY BACK GUARANTEE. NO QUESTIONS ASKED !
If you wish to acquire hands-on Internet of Things Penetration testing and securing skills and be a white hat cyber security superstar, this course is for you! Learn IoT penetration testing (Bluetooth Low Energy) with example of a smart bulb and a smart lock !
According to IHS Markit, the number of IoT devices will grow to 30.7 billion in 2020, and to 75.4 billion by 2025! IDC Forecasts Worldwide Spending on the IoT to reach $772 Billion in 2018!
Whether it is connected automobiles, fitness watches, smart coffee machines, smart locks or even medical equipment such as insulin pumps, IoT is becoming all pervasive. In the future, there will hardly be any aspect of our lives that IoT will not touch one way or the other. Bluetooth Low Energy (BLE) is one of the popular radio protocols used by many IoT devices.
Cyber security professionals who can test and secure IoT devices are expected to be in huge demand and can expect to get lucrative job offers given the shortage of cyber security professionals even for “traditional” cyber security roles!
This course is meant for cyber security professionals who wish to
learn how to identify vulnerabilities in IoT devices that they are authorised
to test. This course also provides an overview of key
risk mitigation measures to secure the IoT devices from cyber attacks.
In this course, the usage of the terms “hacking” or “vulnerability assessment” or “penetration testing” or “exploitation”, refers to the act of identifying vulnerabilities in a system, that one is authorised to test. The end objective being to secure the target system from cyber attacks.
Unauthorised access to computing devices (including IoT) is a punishable offence. Therefore, don’t attempt to test the security of a system/IoT device that you don’t own or are not legally authorised to conduct an assessment on. Lastly, act responsibly and if you detect any vulnerabilities in an IoT device, promptly and securely report those to the IoT device owner and/or the vendor/manufacturer of the IoT device, as applicable in a situation. Provide all available supporting information and follow responsible vulnerability disclosure practices.
Information in this course is distributed “as is” and is meant for educational purposes only. Whilst Cytheon Ltd and its authors/instructors have made every possible effort to ensure that the information in this course is accurate, Cytheon Ltd and its authors/instructors do not own any responsibility whatsoever for any loss, damage, distress or disruption caused to any party, on account of any action taken or not taken on the basis of this course. Despite all the precautions taken, errors or omissions may have crept inadvertently into this course. Cytheon Ltd and its authors/instructors shall be grateful if any such error or omission is brought to their attention for possible correction.
names, images, and logos, may appear in this course.
Instead of using a trademark symbol with every occurrence of a
trademarked name, image, or a logo, the names, images and logos have been used
in this course in an editorial fashion
only, without any intention of trademark infringement.
Use of a term in this course should not be regarded as affecting the validity
of any trademark or service mark. All trademarks and brands within this course are for clarifying purposes only
and are owned by the owner(s) themselves.
Who this course is for:
- Everyone who wants to enhance their cyber security skill beyond basic wireless, windows and *nix hacking and move to a cutting edge security area which is IoT Penetration Testing.
- Every cyber security enthusiast or a professional who wants to stand out from his/her peers in the job market, university or in the organisation they work in.
Cytheon Ltd is a registered company in the United Kingdom and aims to provide cutting-edge cyber security training and publishing services.
Shash (Shashank) Pandey M.B.A, CISSP, CEH, CCSK, is a cyber security advisor, author and speaker based in London, UK. He is also the Founder and Director at Cytheon Ltd, which aims to provide cutting-edge cyber security advisory, training and publishing services. Shashank holds an MBA (University of Cambridge, UK), a Bachelor’s degree in information technology and multiple industry certifications in cyber security, such as CISSP and CCSK. He has over 14 years of professional experience in helping organisations enhance their cyber risk management maturity. He has worked in all three lines of defence roles in his career and in organisations that include a big 4 professional services firm and financial services organisations. His articles and proof of concept codes (to demonstrate vulnerabilities) have been published on major security portals.