YoVDO

Defeating Bluetooth Low Energy 5 PRNG for Fun and Jamming

Offered By: Cooper via YouTube

Tags

Bluetooth Low Energy Courses Cybersecurity Courses Network Security Courses IoT security Courses Vulnerability Analysis Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the vulnerabilities of Bluetooth Low Energy 5 technology in this insightful conference talk. Delve into the intricacies of the Pseudo-Random Number Generator (PRNG) used in BLE 5 and learn how it can be exploited for various purposes, including jamming. Gain valuable knowledge about the security implications of this widely-used wireless protocol and understand the potential risks associated with its implementation. Discover practical techniques and methodologies for analyzing and potentially compromising BLE 5 systems, equipping yourself with essential information for both offensive and defensive cybersecurity practices.

Syllabus

Defeating Bluetooth Low Energy 5 PRNG For Fun And Jamming - Damien Cauquil


Taught by

Cooper

Related Courses

Unlocking Information Security II: An Internet Perspective
Tel Aviv University via edX
Cybersecurity Capstone: Breach Response Case Studies
IBM via Coursera
Complete Ethical Hacking Bootcamp
Udemy
Cyber Security Advanced Persistent Threat Defender Preview
Udemy
Performing Threat Modeling with the PASTA Methodology
Pluralsight