Security protocols and security layers (TLS, Wi-Fi and Bluetooth)

Module duration: 4 hours

Module overview

Transport Layer Security (TLS) is the protocol employed on the Internet to protect communications. Wi-Fi and Bluetooth are the two most widespread technologies of wireless connectivity. These technologies provide some security schemes, but they have also been subjected to many attacks in the past. In this module, we present the goals of these protocols and the points where they have shown weaknesses.

Objective of this module

The main purpose of this module is to give a deep understanding of TLS, the security connections protocol used on the internet. Alongside that, two other security protocols are presented, i.e., bluetooth and Wi-Fi, to acquire a wider knowledge on how two (or more) IoT devices can communicate with each other in a secure way.

What you will learn:

• How the main secure protocols work

• What a public key infrastructure and certificates are

• Which vulnerabilities can be detected in products using those protocols

• Some attacks against secure protocols

You will cover:

This module aims to show most common security protocols, giving a description of them.

  • HTTP protocol and its secure version HTTPS, with encrypted communication
  • Protocol architecture and its security weaknesses

  • Overview of the TLS protocol
  • Public Key Infrastructure and certificates
  • Application level authentication

  • Overview of the protocol and its security
  • BT, BLE and BT Mesh
  • Vulnerabilities on products that use Bluetooth

  • Overview of Wi-Fi protocol versions (WEP, WPA/”, WPA3)
  • Drill down: WPA2 protocol design and security weaknesses

This module is
intended for:

This module is intended for professionals that need to have a thorough understanding of how secure protocols work and use. Additionally, this module provides several examples of secure protocols applications, for a better comprehension by the participants.

Request information

After completing this request for information, we will contact you to provide details on course organization.

If you would like direct information contact us at

* Required field

  I have read and agree to the Privacy Policy

Send request