Understands common risks associated with Bluetooth, including: • Bluesnarfing • Bluejacking • Bluebugging
Industry Roles:
Assessment Methods:
Understands how side-channel attacks can aid cryptanalysis and otherwise expose sensitive data
Industry Roles:
Assessment Methods:
Understands the concepts behind side-channel attacks such as timing analysis and power analysis
Industry Roles:
Assessment Methods:
Understands the concepts behind common microprocessor vulnerabilities such as Spectre and Meltdown
Industry Roles:
Assessment Methods: