Download Interent ExplorerDownload Apple SafariDownload OperaDownload FirefoxDownload Google Chrome

Bluetooth Security Training

Bluetooth Security Training

Bluetooth Security Training:

Bluetooth Security Training Course with Hands-On Exercises (Online, Onsite, and Classroom Live)

Bluetooth is a short-range wireless technology used for applications such as Wireless Personal Area Networks (WPAN), Smart Homes, and the Internet of Things (IoT). In this comprehensive four-day Bluetooth Course: Operation, Security, Applications, Coexistence session, you will acquire in-depth knowledge of all aspects of Bluetooth, including the technology, security, applications, and coexistence issues.

Bluetooth Security Training covers the following topics:

  • Bluetooth Security Training: Bluetooth Overview
  • Bluetooth Security Training: The Bluetooth Radio
  • Bluetooth Security Training: Baseband Signaling I
  • Bluetooth Security Training: Link Management
  • Bluetooth Security Training: Higher Protocols
  • And more…
What’s Included?
  • 4 days of Bluetooth Security Training with an expert instructor
  • Bluetooth Security Course Guide
  • Certificate of Completion
  • 100% Satisfaction Guarantee
RESOURCES:
Related Courses
Customize it:
  • We can adapt this Bluetooth Security Workshop course to your group’s background and work requirements at little to no added cost.
  • If you are familiar with some aspects of this Bluetooth Security Workshop, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the Bluetooth Security Workshop around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Bluetooth Security Workshop course in a manner understandable to lay audiences.
Audience/Target Group

The target audience for this Bluetooth Security Workshop course:

  • This Bluetooth course is for wireless system designers, developers, implementers, and others who require an in-depth understanding of Bluetooth technology.
Class Prerequisites

The knowledge and skills that a learner must have before attending this Bluetooth Security course are:

  • Prior familiarity with wireless networks.
Course Syllabus

Part 1:  Bluetooth Overview

  • Bluetooth usage model and protocol stack
    • Categories of information transmission
    • Short-range wireless features
    • Bluetooth protocol stack: Host and controller

Part 2: The Bluetooth Radio

  • Propagation and ranging
    • RF modeling in indoor environments
    • Calculating maximum range
    • Eavesdropping vulnerability
  • Modulation and radio performance
    • Frequency hopping spread spectrum and Bluetooth channel set
    • Basic rate (BR) and enhanced data rate (EDR) modulation
    • Low Energy (LE) modulation
    • Radio performance

Part 3: Baseband Signaling I

  • BR/EDR functional operation
    • Master/slave timing
    • Automatic Repeat Request (ARQ)
    • Addressing methods
    • Packet structure
    • Error control
    • Frequency hop parameters
    • Logical transport
    • Throughput in perfect and imperfect channels

Part 4: Baseband Signaling II

  • Bluetooth audio
    • Methods of voice encoding
    • SCO and eSCO packet structure and performance
    • SCO vs ACL for wireless audio
  • BR/EDR device discovery, connection, and low-power modes
    • Operational state diagram
    • Paging and inquiry processes
    • Sniff, hold, and park modes
    • Scatternet operation
  • LE baseband operation
    • State diagram
    • Addressing
    • Packet structure
    • Advertising, initiating, and connecting operation
    • Data channel and packet exchange

Part 5: Link Management

  • Overview of Link Management Protocol (LMP)
  • Link management operations
    • Link connection and detachment
    • Maintaining the link
  • LMP packets and examples
    • Link setup
    • Link control

Part 6: Higher Protocols

  • Logical Link Control and Adaptation Protocol (L2CAP)
    • L2CAP overview and purpose
    • Protocol multiplexing and channel definitions
    • L2CAP signaling and channel setup
  • Service Discovery Protocol (SDP)
    • Client-server interaction
    • Service record and attributes
  • LE Attribute Protocol (ATT)
    • ATT operation on attributes
    • ATT retrieval
  • Host Controller Interface (HCI)
    • HCI overview and purpose
    • Summary of commands and events
    • HCI over USB transport example

Part 7: Profiles

  • Profile purpose and interaction
  • Generic Access Profile (GAP)
    • Purpose
    • BR/EDR operational modes
    • LE functions and roles
  • Headset Profile (HSP) and Handsfree Profile (HFP) [BR/EDR]
    • Fundamentals
    • Connections and usage
    • HSP and HFP comparison
  • Advanced Audio Distribution Profile (A2DP) [BR/EDR]
    • Protocol stack
    • Streaming process
    • A2DP and HSP comparison
  • LE profile examples
    • Generic Attribute (GATT) Profile
    • Find-Me Profile (FMP)

Part 8: Security

  • Overview
  • Shared and Public Key cryptography
  • Attack methods
  • Summary of legacy security
    • Link key generation and initialization
    • Combination key derivation
    • Authentication
    • Encryption
  • Secure Simple Pairing

Part 9: Qualification and Test

  • Qualification
    • Requirements
    • Program overview
    • Types of Bluetooth products
    • Steps to qualification
  • Testing
    • Development tools
    • Component test mode
    • Examples of devices and performance

Part 10: Coexistence

  • Coexistence overview
    • Bluetooth and Wi-Fi signal spectra
    • Interference modeling
  • Bluetooth-on-Bluetooth coexistence
    • Range of vulnerability
    • Simulation analysis
  • Bluetooth and Wi-Fi coexistence
    • Separated nodes
    • Collocated nodes
    • Examples and throughput analysis
  • Improving coexistence and interference mitigation

Request More Information

    Time frame: