top of page
Image by Akshar Dave🌻

Security protocols and security layers (TLS, Wi-Fi, and Bluetooth)

Module duration: 4 hours

Module overview

Transport Layer Security (TLS) is the protocol employed on the Internet to protect communications. Wi-Fi and Bluetooth are the two most widespread technologies of wireless connectivity. These technologies provide some security schemes, but they have also been subjected to many attacks in the past. In this module, we present the goals of these protocols and the points where they have shown weaknesses.

Objective of this module

The main purpose of this module is to give a deep understanding of TLS and the security connection protocol used on the internet. Alongside that, two other security protocols are presented, i.e., Bluetooth and Wi-Fi, to acquire a broader knowledge of how two (or more) IoT devices can securely communicate with each other.

What you will learn:


How the main secure protocols work


What a public key infrastructure and certificates are


Which vulnerabilities can be detected in products using those protocols


Some attacks against secure protocols

You will cover:

This module aims to show most common security protocols, giving a description of them.

• HTTP protocol and its secure version HTTPS, with encrypted communication
• Protocol architecture and its security weaknesses

• Overview of the TLS protocol
• Public Key Infrastructure and certificates
• Application level authentication

• Overview of the protocol and its security
• BT, BLE and BT Mesh
• Vulnerabilities on products that use Bluetooth

• Overview of Wi-Fi protocol versions (WEP, WPA”, WPA3)
• Drill down: WPA2 protocol design and security weaknesses

This module is
intended for:

This module is intended for professionals who need to have a thorough understanding of how secure protocols work and are used. Additionally, it provides several examples of secure protocol applications to help the participants better comprehend.

Image by Akshar Dave🌻
Contact Us

Contact Us

Fill in the form below, and we will contact you to provide details on course organization.

Thank you for your message. We'll contact you shortly.

bottom of page