Wireless Security (Workshop)
Trainings & Workshops
In times of increasing networking, the security demands of radio applications are increasing rapidly. Our experts will show you what you need to pay attention to when developing secure radio systems and which mechanisms are available to you. First, general possible security vulnerabilities and susceptibilities are touched upon, before specific standard-dependent security features are examined. We will give you recommendations for additional security for your radio products and present you with best practices on your way. This allows you to let the full advantages of our expertise feed into your projects.
- Bluetooth Classic / BLE security features
- Evolution of security features
- Selection of security features: which should/shouldn't you use.
- Advantages and disadvantages of individual security features
Developers, project manager, system architects, decision makers
No previous knowledge required
Understanding of BLE security features and how they should be used and what should be avoided. Security flaws are shown in detail. What is important when selecting a radio chip. What is important when selecting the stack.