Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Understanding and Exploiting Implanted Medical Devices

Black Hat via YouTube

Overview

This course aims to provide detailed technical findings on the remote exploitation of implanted medical devices such as pacemaker systems and neurostimulator systems. The learning outcomes include understanding vulnerabilities in these devices, the potential risks to patient safety, and the implications for therapy disruption. The course teaches skills in assessing cyber security risks, analyzing radio communications, evaluating software delivery networks, and conducting FDA analysis. The teaching method involves presenting research findings, discussing trust issues, and exploring remote exploitation scenarios. The intended audience for this course includes cybersecurity professionals, medical device manufacturers, healthcare professionals, and individuals interested in the security of medical devices.

Syllabus

Introduction
Presentation Overview
Cyber Security
Research Findings
What Went Down
Takeaway
Trust Issues
Remote Not Remote
Risk to Patient Safety
Insulin Pump
Radio Considerations
Pacemaker and ICD
Radio Communications
Software Delivery Network
Software Updates
Update Infrastructure
Report
FDA Analysis Board
pacemaker remotely
risk scoring system
Microsoft vulnerability
Questions

Taught by

Black Hat

Reviews

Start your review of Understanding and Exploiting Implanted Medical Devices

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.