This course focuses on IoT exploitation with a major emphasis on hardware hacking, Bluetooth
vulnerabilities, and hardware security. Participants will engage in hands-on techniques to
exploit, analyze, and secure IoT hardware.
Basic electronics knowledge and embeddeds
Familiarity wireless communications
CTF winners gets swags and Training kit from
IOTSRG
Laptop withÂ
Participants will gain hands-on experience in exploiting and securing IoT devices, focusing on
hardware security, Bluetooth vulnerabilities, and best practices for safeguarding devices.