- Lior SharonLoudmouth SecurityIoT and Embedded Device ExploitationCody NelsonAugust 5 - 6, 16 Credit Hours

Lior Sharon
In the rapidly evolving landscape of the Internet of Things (IoT), understanding the security vulnerabilities and exploitation techniques of IoT devices has become crucial for cybersecurity professionals. This course aims to equip participants with the skills and practical knowledge to find vulnerabilities in IoT devices. Participants will gain hands-on experience in IoT hardware debugging, memory extraction, firmware analysis and bug hunting using a custom-built IoT device and firmware based on real-world examples. In addition, this course will introduce participants to device emulation and wireless communications in IoT devices, with hands-on labs to put the knowledge into practice. This course bridges multiple disciplines within cybersecurity, including application security, operating system penetration testing, wireless signal analysis, and embedded hardware security. It is designed to empower professionals to perform penetration testing of IoT devices, ensuring they are equipped with the knowledge and experience to find and exploit vulnerabilities in them.
Skills / Knowledge
- IoT
- Hardware