Introduction to IoT
– Briefing of IIOT and usage
– Architecture
– Framework/Platforms
– Attack Surfaces
– Owasp IOT top 10 Vulnerabilities
MQTT
– Introduction
– Protocols details
– Recon and Enumeration of Topics
– DOS attack
COAP
– Introduction
– Protocols details
– Recon and Enumeration
– COAP proxy attacks
Zigbee (802.15.4)
– Introduction and protocol Overview
– Reconnaissance
– Sniffing and Eavesdropping
– Replay attacks.
– Packet Forging attack
– Jamming Attacks
– Dissociation Attacks
Bluetooth Low Energy (BLE)
– Introduction and protocol Overview
– Reconnaissance (Active and Passive) with HCI tools
– GATT service Enumeration
– Sniffing GATT protocol communication
– Reversing GATT protocol communication
– Read and writing on GATT protocol
– Cracking encryption
SUB-Ghz RF
– Introduction
– Reconnaissance
– Overview of various shift keying
– Reversing of RF
– Crafting RF signals
Firmware Reversing
– Identifying compression and types
– Firmware Analysis
– Simulating Firmware
ARM
– Architecture
– Instruction set
– Procedure call convention
– System call convention
– Reversing techniques
– Buffer overflow attacks
Course Features
- Lectures 0
- Quizzes 0
- Duration 10 weeks
- Skill level All levels
- Language English
- Students 0
- Assessments Yes






