Skip to main content

Enrolment options

Bluetooth Security
Cybersecurity
Preview Course

Cybersecurity

Bluetooth Security

HRDC Reg. No: 10001658763
Duration: 5 Days

Course Overview

This intensive 5-day course provides a deep technical understanding of Bluetooth security across both Classic and Bluetooth Low Energy (BLE) environments. Participants will explore how Bluetooth protocols enforce security, establish trust, and protect data through encryption, authentication, and key management.

The course combines protocol-level theory with real-world implementation and offensive security perspectives. Participants will learn to identify vulnerabilities, perform security assessments, and design secure Bluetooth-enabled systems for IoT, medical, industrial, and consumer applications.


Who Should Attend

  • Embedded Systems Engineers
  • IoT Developers
  • Firmware Engineers
  • Security Engineers
  • Penetration Testers
  • Wireless Communication Engineers

Why Choose This Course

  • HRDC claimable training (HRDC Reg. No: 10001658763)
  • Deep technical focus on Bluetooth Classic & BLE
  • Covers real-world vulnerabilities (KNOB, BIAS, BlueBorne)
  • Hands-on security testing using industry tools
  • Designed for IoT and embedded security professionals

Learning Outcomes

By the end of this course, participants will be able to:

  • Explain Bluetooth architecture across PHY, Link Layer, HCI, and Host layers
  • Differentiate Bluetooth Classic vs BLE security models
  • Analyze security modes, levels, and downgrade risks
  • Implement secure pairing using Secure Connections (ECDH)
  • Manage Bluetooth key hierarchy (LTK, IRK, CSRK)
  • Apply secure key storage using hardware-backed security
  • Implement encryption using AES-CCM
  • Design secure GATT services and enforce application security
  • Identify and analyze Bluetooth attack vectors (MITM, KNOB, BIAS, BlueBorne)
  • Conduct Bluetooth security testing using professional tools
  • Implement secure OTA firmware updates
  • Apply NIST SP 800-121 compliance guidelines
  • Design defense-in-depth strategies for IoT devices

Prerequisites

Participants should have:

  • Basic knowledge of wireless communication
  • Familiarity with Bluetooth Classic or BLE fundamentals
  • Understanding of networking and cryptography concepts
  • Experience in embedded systems or IoT (recommended)
  • Basic cybersecurity knowledge

Lab Setup

Participants should prepare:

  • Laptop with Linux environment (Ubuntu/Kali recommended)
  • Bluetooth adapter (BLE compatible)
  • Python environment (optional for tooling)

Tools Used:

  • Wireshark
  • Ubertooth One
  • Bettercap
  • BLE scanning tools (e.g., gatttool, bleah)

Teaching Methodology

  • Instructor-led deep technical sessions
  • Hands-on labs and packet analysis
  • Real-world attack simulations
  • Guided security testing exercises
  • Case studies and implementation workshops

  • (0)
  • Guest access