This course covers the topics of exploiting medical devices and setting up honeypots. The goal is to understand the vulnerabilities in medical devices and how to protect against them using honeypots. The course teaches skills such as identifying security flaws in medical devices and implementing honeypots for defense. The teaching method involves practical demonstrations and real-world examples. This course is intended for cybersecurity professionals and individuals interested in medical device security.
Overview
Syllabus
Break Me14 Medical Devices Pwnage and Honeypots Scott Erven Mark Collao