Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Securing the Internet of Things - IoT Through Security Research and Vulnerability Analysis

via YouTube

Overview

Explore the world of IoT security through a comprehensive conference talk that delves into vulnerability analysis and research methodologies. Learn about the invasion of IoT devices, NRF Connect, medical device security, and Bluetooth vulnerabilities. Discover various testing methodologies and hacking techniques applied to telepresence robots, Cloud Pis, and GPS panic buttons. Examine real-time tracking systems, Insteon Wink devices, and mobile app vulnerabilities. Gain insights into GNU Radio Companion, Insteon protocols, and firmware extraction techniques. Investigate embedded multimedia controllers, file systems, secure boot processes, and chip rewriting. Enhance your understanding of IoT security challenges and solutions through this in-depth presentation.

Syllabus

Introduction
Background
Invasion of IoT
NRF Connect
Medical Device
Bluetooth
Security Researchers
Agenda
IoT Ecosystem
Testing Methodology
Hacking Overview
Telepresence Robot
Cloud Pis
Installation Key
Robot Key
GPS Panic Button
Owners Manual
Factory Reset
Getting a Phone Number
Bounce Check
RealTime Tracking System
GPS Data
RealTime Tracking
Insteon Wink
Insteon Mobile App
Change Your Password
GNU Radio Companion
Insteon Protocol
Removing Flash Memory
Removing Memory Chips
Removing Firmware
Embedded Multimedia Controller
File Systems
Secure Boot
Rewrite Chip
Conclusion
Questions

Reviews

Start your review of Securing the Internet of Things - IoT Through Security Research and Vulnerability Analysis

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.