Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Udemy

Ethical Hardware Hacking

via Udemy

This course may be unavailable.

Overview

IoT Penetration Test and Forensics Analysis

What you'll learn:
  • Hardware Analysis (eg IoT Devices, Smart Phone)

Ethical Hardware Hacking

Module 1 – WiFi (To be published)

Students will understand the WiFi security issues, how to gather the network information, crack the encryption key and set up IDS for WiFi network.

Module 2 – Bluetooth (To be published)

Students will know the vulnerabilities of the devices using BLE, how to sniff the packets, analyse the packets or even take over the devices.

Module 3 – Zigbee (To be published)

Students will recognise the connection of devices using 802.15.4, how to eavesdrop the pairing of the devices within the mesh network and control the devices.

Module 4 – SDR (To be published)

Students can identify the frequency of the RF devices, how to capture the signal and replay it, so that can raise the awareness the use of these devices.

Module 5 – USB (Published)

Students will learn some common BadUSB devices, how to write the payload and deploy the payload, so that can prevent the attack.

Module 6 – RFID (Published)

Students will learn the vulnerability of RFID and take this opportunity to know the secret of the tag, how to clone the different types of RFID tag for analysis or even pentesting.

Module 7 – JTAG (Partially Published)

Module 8 – Chip Off (To be published)

Module 9 - Firmware (Partially Published)

Module 10 - GPS (Published)

Module 11 - Forensics (Partially Published)

Taught by

Kelvin C

Reviews

3.6 rating at Udemy based on 91 ratings

Start your review of Ethical Hardware Hacking

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.