Securing the Internet of Things - IoT Through Security Research and Vulnerability Analysis
Offered By: YouTube
Course Description
Overview
Explore the world of IoT security through a comprehensive conference talk that delves into vulnerability analysis and research methodologies. Learn about the invasion of IoT devices, NRF Connect, medical device security, and Bluetooth vulnerabilities. Discover various testing methodologies and hacking techniques applied to telepresence robots, Cloud Pis, and GPS panic buttons. Examine real-time tracking systems, Insteon Wink devices, and mobile app vulnerabilities. Gain insights into GNU Radio Companion, Insteon protocols, and firmware extraction techniques. Investigate embedded multimedia controllers, file systems, secure boot processes, and chip rewriting. Enhance your understanding of IoT security challenges and solutions through this in-depth presentation.
Syllabus
Introduction
Background
Invasion of IoT
NRF Connect
Medical Device
Bluetooth
Security Researchers
Agenda
IoT Ecosystem
Testing Methodology
Hacking Overview
Telepresence Robot
Cloud Pis
Installation Key
Robot Key
GPS Panic Button
Owners Manual
Factory Reset
Getting a Phone Number
Bounce Check
RealTime Tracking System
GPS Data
RealTime Tracking
Insteon Wink
Insteon Mobile App
Change Your Password
GNU Radio Companion
Insteon Protocol
Removing Flash Memory
Removing Memory Chips
Removing Firmware
Embedded Multimedia Controller
File Systems
Secure Boot
Rewrite Chip
Conclusion
Questions
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube