- Type Learning
- Level Intermediate
- Time Days
- Cost Paid
DEF CON Training Certificate of Completion - Offensive IoT Exploitation
Issued by
DEF CON
The earner has complete a 2 day course and mastered IoT device security by learning to exploit vulnerabilities. They gained skills in debugging interfaces like UART and JTAG, extracting and analyzing firmware, and communicating with memory devices such as SPI Flash and eMMC. Additionally, they practiced glitching and side channel attacks, and analyzed IoT communication protocols like Bluetooth, Zigbee, Thread, and Matter, using industry tools to discover new vulnerabilities effectively.
- Type Learning
- Level Intermediate
- Time Days
- Cost Paid