Understanding Internet of Things (IoT): 802.15.4+

Understanding Internet of Things (IoT) is the only IoT course series designed with the Technical Security Professional in mind.  This series of courses are built to teach personnel the operational characteristics and methods for specific protocols making up the IoT Infrastructure. These complex environments surrounding building automation, Smart Cities, municipal metering, industrial and home automation for lighting, doors, locks, blinds, etc. create a web of wireless energy.

In this 802.15.4+ course:, students will:

  • Learn various protocol stacks—IEEE 802.15.4, ZigBee, 6LoWPAN, Thread, Wi-SUN, and Z-Wave

  • Develop a clear understanding of what normal and abnormal traffic looks like

  • Build, administer, and troubleshoot their own custom IoT networks using various protocols, commercially available equipment, and open source software

This class is extremely hands-on in nature.  In every module students will participate in demonstrations, activities, and labs to reinforce learning objectives.  In addition, students will walk away with a range of equipment, projects, and software to ensure they can make their own IoT protocol lab. 

How can one defend a system or exploit it unless the protocol itself is fully understood?  This class fills that gap! 

Students will be given the following equipment to implement their own IoT networks and practice course objectives long after class has finished:

* IoT3: Protocol Traffic Generator

* Protocol-Specific Protocol Dongles

* Protocol-Specific Test Devices

* IoT Protocol Workbook


Course overview

  • Market Examination

  • Protocol Discussion in Depth

  • Network Topology and Device States

  • Capturing and Analyzing the Traffic

    • Low Cost, Open Source Tools​

    • Commercial Tools

  • Normal and Abnormal Behaviors​

  • Security

    • Exploits​

    • Mitigations

    • Tools and Techniques

    • Survey and Geolocating

  • Instructor-Led Activities​

  • Labs

    • Find the Hidden Device​

    • ID the Abnormal Behavior

    • Penetration-Test the Network

    • Modify the Device Firmware

  • Final Exam & Exercise​