Bluetooth Security Training

Commitment 2 Days, 7-8 hours a day.
Language English
User Ratings Average User Rating 4.8 See what learners said
Price REQUEST
Delivery Options Instructor-Led Onsite, Online, and Classroom Live

COURSE OVERVIEW

Bluetooth is a short-range wireless technology used for applications such as Wireless Personal Area Networks (WPAN), Smart Homes, and the Internet of Things (IoT). In this comprehensive 2-day Bluetooth Security Training Course covering the security capabilities of Bluetooth Operation, and Applications session, you will acquire in-depth knowledge of all aspects of Bluetooth, including the technology, security, applications, and coexistence issues.

WHAT'S INCLUDED?
  • 2 days of Bluetooth Security Training with an expert instructor
  • Bluetooth Security Electronic Course Guide
  • Certificate of Completion
  • 100% Satisfaction Guarantee
RESOURCES
RELATED COURSES

ADDITIONAL INFORMATION

COURSE OBJECTIVES

Upon completion of this Bluetooth Security Training course, the participants will be able to:

  • Discuss architecture elements of Classic Bluetooth and Bluetooth Low Energy (BLE)
  • Compare Classic Bluetooth vs. Bluetooth Low Energy (BLE) protocols, security features
  • List Bluetooth Classic and Bluetooth Low Energy vulnerabilities, threats, attack types, and countermeasures
  • List Bluetooth Classic and Bluetooth Low Energy protocols, vulnerabilities, threats, and countermeasures
  • Analyze L2/L3 packets in both Classic Bluetooth and Bluetooth Low Energy (BLE)
  • Analyze security features in Bluetooth Low Energy GATT profiles
CUSTOMIZE IT
  • We can adapt this Bluetooth Security Training Workshop course to your group’s background and work requirements at little to no added cost.
  • If you are familiar with some aspects of this Bluetooth Security Workshop, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the Bluetooth Security Training Workshop around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Bluetooth Security Workshop course in a manner understandable to lay audiences.
AUDIENCE/TARGET GROUP

The target audience for this Bluetooth Security Training Workshop course:

  • This Bluetooth course is for wireless system designers, developers, implementers, and others who require an in-depth understanding of Bluetooth technology.
CLASS PREREQUISITES

The knowledge and skills that a learner must have before attending this Bluetooth Security Training course are:

  • Prior familiarity with wireless networks.

COURSE SYLLABUS

Overview of Bluetooth Wireless Technology
  • Bluetooth Architecture
  • Classic Bluetooth Physical Layer
  • Bluetooth Channels and Principles of Frequency Hopping
  • Classic Bluetooth Protocol stack
  • Asynchronous Connection-Less (ACL)
  • Synchronous Connection-Oriented (SCO)
  • Active Slave Broadcast (ASB)
  • Parked Slave Broadcast (PSB)
  • The link control protocol (LC)
  • Link manager protocol (LMP)
  • Low-energy link layer (LELL)
  • Host controller interface (HCI
  • Classic Bluetooth Host stack
  • Logical link control and adaptation protocol (LCAP)
  • Bluetooth network encapsulation protocol (BNEP)
  • Radiofrequency communication (RFCOMM)
  • Service discovery protocol (SDP)
  • Telephony Control Protocol Specification (TCS)
  • Audio/video control transport protocol (AVCTP)
  • Audio/video distribution transport protocol (AVDTP)
  • Object exchange (OBEX)
  • Bluetooth Low Energy (BLE) Physical Layer
  • BLE Protocol stack
  • Low Energy Attribute Protocol (ATT)
  • BLE Profiles and Services
  • Bluetooth Low Energy (BLE) Controller and Host stack
  • Generic Access Profile (GAP)
  • Generic Attribute Profile (GATT)
  • Bluetooth Security Training
Bluetooth Classic and BLE Operations
  • Bluetooth packet structure and connection procedures
  • Device Discoverability and Connectability
  • Masters and Slaves
  • Device Addressing
  • Pairing and Bonding
  • Security Modes and Levels
  • Pairing Modes
  • Pairing Phases
  • Pairing Procedures
  • STK generation methods
  • Just Works
  • Passkey Display
  • Out of Band (OOB
  • Numeric
  • Bluetooth Security Training
Overview of Bluetooth Security Features  
  • Connecting to Secure Bluetooth Networks
  • Security Features of Bluetooth BR/EDR/HS
  • Security Features of Bluetooth Low Energy (BLE)
  • Pairing and Link Key Generation
  • Authentication
  • Confidentiality
  • Bluetooth Trust Levels, Service Security Levels, Modes, and Authorization
  • Bluetooth Low Energy (BLE) Security
  • BLE Security Modes and Levels
  • BLE Pairing Methods
  • Legacy Low Energy Key Generation and Distribution
  • BLE Secure Connection Key Generation
  • BLE CIA (Confidentiality, Authentication, and Integrity)
  • BLE Short-Term Key (STK) and Long-Term Key (LTK)
  • LTK Derivation from Bluetooth Link Key
  • Bluetooth Link Key Derivation from Low Energy Long-Term Key
Bluetooth Application and Service Attacks
  • Bluetooth Cryptographic Attacks
  • Bluetooth Classic and BLE Threat Actors
  • Bluetooth Classic and BLE Vulnerabilities, Threats, and Countermeasures
  • Bluetooth Classic and BLE Risk Mitigation and Countermeasures
  • Bluetooth Classic and BLE Security Checklist and Mitigation Road maps
  • Overview of Open Source Tools
Bluetooth Security TrainingBluetooth Security Training Course Wrap-Up

REQUEST MORE INFORMATION