IoT Security Hacks Hands-On

Become an expert in IoT security.

IoT Security Hacks Hands-On

The IoT Security Hacks Hands-On Training provides a hands-on approach to dive into the topic of IoT security. With hands-on exercises, you will learn how to work through common IoT device attack vectors in a practical way and understand the IoT threat landscape. The best way to understand IoT security challenges is to experience and overcome them in a secure environment.

In this training, you will learn not only how to prevent attacks on IoT devices, but also how to detect and defend against potential threats. Through hands-on exercises and demonstrations, you will gain an in-depth understanding of the complex security threats IoT devices face.

Content

Practical exercises accompanied by short blocks of theory will give you a practical understanding of the topic of IoT security.

Introduction

  • IoT Threat Landscape
  • Threat Modeling
  • IoT Security Testing Methodology

Network Hacking

  • Analysis of network protocols
  • Exploiting Zero-Configuration Networking

Hardware Hacking

  • UART, JTAG and SWD Exploitation
  • SPI and I2C
  • Firmware Hacking and Firmware Reverse Engineering

Fun Hacking

  • Short-range radio: misuse of RFID
  • Bluetooth Low Energy
  • Medium-range radio: Wi-Fi hacking
  • Long-range radio: LPWAN, LoRa-WAN

Attacks on the IoT ecosystem

  • Attacks on mobile application
  • Smart homes hacking

Learning Objectives

After the IoT Security Hacks Hands-On Training, you will be able to:

  • describe the threat landscape of IoT devices,
  • describe the common network protocols in the IoT environment,
  • perform network-based attacks on IoT devices,
  • explain which hardware components are often built into IoT devices and how they are vulnerable to attacks via debugging and maintenance interfaces,
  • name the most commonly used radio frequencies in IoT,
  • perform simple attacks in the radio domain,
  • Enumerate attacks on the IoT ecosystem, and
  • Demonstrate attack surfaces using mobile apps.

Target Group

This training is intended for information security managers, information systems architects, security testers, security consultants, security engineers, network engineers, system administrators, and those interested in IoT hacking. It is designed for individuals but can also be set up as a company course.

Details

  • Location: Bern, Basel, Zurich
  • Duration: 3 Days

Booking

Immerse yourself in the IoT Security Hacks Hands-On Training and learn how to work through common IoT device attack vectors and understand the IoT threat landscape. Experience IoT security challenges in a secure environment and overcome them with hands-on exercises. The training is organized in cooperation with digicomp.

digicomp logo

Company Course

Would you like to book the IoT Security Hacks Hands-On Training for all of your employees? Oneconsult develops and organizes courses tailored to the needs of your company. Contact us for an individual offer.

You might also be interested in
The extensive preparation for a cyber incident.
Illustrate the dangers of a cyber incident to your employees.
Illustrate the dangers of a cyber incident to your employees.

Don’t miss anything! Subscribe to our free newsletter.

Your security is our top priority – our specialists provide you with professional support.

Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).

Private individuals please contact your trusted IT service provider or the local police station.

For more information about our DFIR services here:

QR_CSIRT_2022_EN@2x
Add CSIRT to contacts