Module duration: 4 hours
Transport Layer Security (TLS) is the protocol employed on the Internet to protect communications. Wi-Fi and Bluetooth are the two most widespread technologies of wireless connectivity. These technologies provide some security schemes, but they have also been subjected to many attacks in the past. In this module, we present the goals of these protocols and the points where they have shown weaknesses.
The main purpose of this module is to give a deep understanding of TLS, the security connections protocol used on the internet. Alongside that, two other security protocols are presented, i.e., bluetooth and Wi-Fi, to acquire a wider knowledge on how two (or more) IoT devices can communicate with each other in a secure way.
This module aims to show most common security protocols, giving a description of them.
• HTTP protocol and its secure version HTTPS, with encrypted communication
• Protocol architecture and its security weaknesses
• Overview of the TLS protocol
• Public Key Infrastructure and certificates
• Application level authentication
• Overview of the protocol and its security
• BT, BLE and BT Mesh
• Vulnerabilities on products that use Bluetooth
• Overview of Wi-Fi protocol versions (WEP, WPA/”, WPA3)
• Drill down: WPA2 protocol design and security weaknesses
This module is intended for professionals that need to have a thorough understanding of how secure protocols work and use. Additionally, this module provides several examples of secure protocols applications, for a better comprehension by the participants.
After completing this request for information, we will contact you to provide details on course organization.
If you would like direct information contact us at email@example.com
* Required field