Wireless, Mobile and Internet of Things Security
Wireless technologies are ubiquitous in modern systems yet pose unique challenges. This technical course looks at security issues of a broad range of wireless devices from wireless computers, mobile phones and operational technologies. The course takes an in-depth look at types of different protocols, technologies, contextual considerations as well as practical approaches to attack and defence.
Topics covered include:
- 802.11 Wi-Fi
- Common attacks and defenses for individual devices and IoT
- Software defined radio
- Bluetooth, ZigBee, DECT and a library of other lab exercises individually tailored to the class
This course assumes knowledge from Cyber Security Boot Camp. While this is a technical course, it is instructor led and designed so non-technical students can further understand how attacks are carried out and better comprehend defence techniques.
On completion of this course, participants should be able to:
- Understand network topologies and protocols within wireless technologies.
- Understand interconnected hardware and software.
- Understand the issues facing wireless vs wired technologies.
- Understand integrated networks.
- Engage in discussion about and comprehend the security implications pertaining to wireless technologies.
Course Day Breakdown
Introduction to wireless technology, common attacks and 802.11
Day 1 of the course introduces students to networking basics such as protocols used, transport layers, proxies and reorientates students to the wireless environment. The day will feature common discovery techniques as well as attacks on common 802.11 infrastructure.
Wireless technologies and Security, Networking Basics, Fundamentals of Wireless.
Continuation of 802.11
Day 2 sees students continue to develop their understanding of 802.11 with a focus on attacking client devices, complex networks as well as basic defence techniques.
Client Side Attacks, Monitoring and Defences.
Introduction to software defined radio
Day 3 of the course will introduce students to software defined radio as well as areas relating to the field including DECT, mobile telecommunications and satellite communications.
SDR, Satcom, DECT, Mobile Telecommunications, POCSAG.
802.15.4, PANs and Bluetooth
Day 4 focuses on other bespoke networks, protocols and personal area networks including Bluetooth, NFC and 802.15.4. A “bull ring” of problem solving activities will be employed and instructor led for this activity.
PANs, Bluetooth, NFC, 802.15.4, Attack Surfaces, Zigbee Environment.
IOT and defences
Our final day will conclude with an exploration of IoT environments, as well as defensive practices from a development and operational standpoint.
IoT Research and Defences, IoT practical activities.
Who Should Attend
Security engineers, IT/Cyber professionals, Network security staff, Incident response teams, Security consultants.
What You Will Receive
- Comprehensive set of course notes.
- UNSW Canberra certificate of attendance.
- Morning tea, lunch and afternoon tea.
NICE Framework Mapping
This course maps to the following NICE Framework KSAs (Knowledge, Skills & Abilities):
K0108: Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless).
K0177: Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
K0442: Knowledge of how converged technologies impact cyber operations (e.g., digital, telephony, wireless).
K0446: Knowledge of how modern wireless communications systems impact cyber operations.
K0520: Knowledge of principles and practices related to target development such as target knowledge, associations, communication systems, and infrastructure.
K0600: Knowledge of the structure, architecture, and design of modern wireless communications systems.
K0614: Knowledge of wireless technologies (e.g., cellular, satellite, GSM) to include the basic structure, architecture, and design of modern wireless communications systems.
S0256: Skill in providing understanding of target or threat systems through the identification and link analysis of physical, functional, or behavioural relationships.
A0092: Ability to identify/describe target vulnerability.
What is the NICE Framework?
The National Initiative for Cybersecurity Education (NICE) Cyber Security Workforce Framework developed by the National Institute of Standards and Technology (NIST) establishes a taxonomy and common lexicon that describes cyber security work and job roles.
To find out more about the NICE Framework, go to: https://niccs.us-cert.gov/workforce-development/cyber-security-workforce-framework
UNSW Canberra Cyber
UNSW Canberra Cyber is a unique, cutting-edge, interdisciplinary research and teaching centre, working to develop the next generation of cyber security experts and leaders.
The centre is based in Canberra at the Australian Defence Force Academy and provides professional, undergraduate and post graduate education in cyber security. Our air-gapped, state of the art cyber range offers a secure environment where we deliver a number of technical and highly specialised learning opportunities.
Our courses are designed to give the next generation of cyber security professionals the skill sets needed to thrive in the industry. We can also create bespoke professional education programs tailored to your organisation's needs.
Contact us at email@example.com to discuss how.