- Duration: Flexible
Course details
This course is designed to familiarize students with Radio Frequency Identification (RFID) and Near Field Communication (NFC) technology, historic timeline, RFID industry standards, federal rules and regulations (FCC), the different types of RFID typologies (readers, tags, etc.), differences between RFID vs. NFC, low-frequency (LF), high-frequency (HF), and ultra-high frequency (UHF), and the evolution of RFID from it's inception to our current and modern times. Students will also learn about RFID vulnerabilities, such as cloning, data manipulation, middle-man attacks on RFID systems, and much more.
Additionally, students will learn about the different Command Line Interface (CLI) commands for the Proxmark3, where we'll dive deeper into reading, writing, and cloning RFID tags with Proxmark, and other RFID capable devices, such as the Keysy, Flipper Zero, and HackRF with GNU Radio, where we will explore a conceptual model of signal reading, processing, decrypting and relaying a high-frequency RFID tag, such as the MiFare Classic (ISO 14443). We will also discuss different RFID industry leaders, government contractors, protocols, and independent authorities who set the industry precedent for RFID and NFC.
This course is designed to bring about RFID awareness from a security researcher perspective, and is designed for ethical hackers, cybersecurity researchers, and IT professionals, with an emphasis on signals intelligence.
Updated on 02 May, 2023- Cyber Security Awareness John AcademyUSD 25Duration: 1 Hour
- IT: Ethical Hacking Course LineUSD 24
USD 480Duration: Upto 14 Hours