Aerial Assault: Combining Drones and Pentesting (W54) - Pentestmag

Aerial Assault: Combining Drones and Pentesting (W54)

$299.00

This course explores the cutting-edge intersection of drone technology and cybersecurity penetration testing. As drones become more accessible and advanced, their potential for both offensive operations and defensive strategies grows. Participants will learn how to leverage drones for penetration testing while understanding the opportunities and challenges presented by aerial platforms in cybersecurity. This course covers the technical foundations of drones, offensive drone operations, defensive strategies against drones, and the ethical and legal implications of drone use in cybersecurity.

Only 3 left in stock


Get the access to all our courses via Subscription

Subscribe

Categories: ,

Description

DURATION: 12 hours

CPE POINTS: On completion you get a certificate granting you 12 CPE points. 

Course launch date: June 3rd, 2024


The "Aerial Assault: Combining Drones and Pentesting" online course explores the cutting-edge intersection of drone technology and cybersecurity penetration testing. As drones become more accessible and advanced, their potential for both offensive operations and defensive strategies grows. Participants will learn how to leverage drones for penetration testing while understanding the opportunities and challenges presented by aerial platforms in cybersecurity. This course covers the technical foundations of drones, offensive drone operations, defensive strategies against drones, and the ethical and legal implications of drone use in cybersecurity.


! IMPORTANT NOTE ! 

Due to the sensitive nature of the topics presented in this course each purchase and student application will be verified via email before access is granted.


Who is this course for?

  • Cybersecurity professionals seeking to expand their toolkit.
  • Enthusiasts and hobbyists interested in the intersection of drones and cybersecurity.
  • Penetration testers looking for innovative methods to conduct assessments.

Why take it NOW?

Now is the time to take this course so you can begin to develop an understanding of how these two can work together, and to start thinking progressively as the technology becomes cheaper and more advanced.

Why this course?

  • Timely Relevance: With the rapid advancement and proliferation of drone technology, understanding how to utilize and protect against drones is becoming crucial in the cybersecurity field.
  • Innovative Approach: Combines practical skills in penetration testing with the emerging field of drone technology, offering a unique skill set.
  • Practical Application: Provides hands-on experience and knowledge applicable to real-world security challenges, preparing participants for the future of cybersecurity.

Course benefits:

What skills will you gain?​​ ​​​

  • Students will hopefully be able to transfer the didactic material of this course to practical hands-on experience. If the student has a drone at the time of taking the course, it is encouraged to attempt some of the course material on their own to gain real-world experiences.

What will you learn about?

  • Technical knowledge of drone operations and cybersecurity threats.
  • Hands-on skills in conducting offensive and defensive operations using drones.
  • Ethical and legal frameworks governing the use of drones in penetration testing.

What tools will you use?

  • To be determined as course material develops.

Course general information: 

Course format: 

  • Self-paced
  • Pre-recorded
  • Accessible even after you finish the course
  • No preset deadlines
  • Materials are video, labs, and text
  • All videos captioned

What will you need?

This course will require the student to have:

  •      A computer

Optional:

  •      A Drone/UAS

What should you know before you join?

  • Basic understanding of WiFi hacking, MitM attacks, and social engineering/recon principles.
  • Familiarity with cybersecurity concepts and penetration testing.

YOUR INSTRUCTOR - Steven Coffey

I am a dedicated Cybersecurity and Drone Technologies expert with a broad skill set in cybersecurity, network administration, web development, and the application of drone and robotics technologies. My work focuses on enhancing operational workflows, with a particular emphasis on technological solutions that improve public safety and service efficiency. Currently advancing my expertise through a Computer and Information Systems Security program, I am committed to lifelong learning, holding several IT and emergency services certifications. My background includes competitive achievements in cybersecurity and extensive experience in First Response and Emergency Services, reflecting my passion for public safety and innovation. Driven by the challenge of integrating cutting-edge technology into practical applications, I aim to inspire and educate on the potential of technology to advance operational and community well-being.


COURSE SYLLABUS


Module 0

 Before the Course

Basic concepts in cybersecurity, introduction to drones, and an overview of penetration testing tools.


Module 1

Exploring the Intersection of Drone Technology and Cybersecurity

This topic is especially important to the course. This is where the foundational knowledge will begin to be formed. This module will hopefully start to shape a new perspective for the student in how these technologies can work both against and for each other.

Module 1 covered topics: 

  • Drone basics
  • Types of drones 
  • Applications in cybersecurity
  • Ethical consideration

Module 1 exercises:

  • Summary Quiz of module content. This uses the standard model to test retention of information post-instruction.

Module 2

Technical Foundations of Drones

This module will allow the student to develop an understanding and appreciation for the technology inside of a drone and how they operate. As some methods may involve the use of internal hardware it is important the student understands what they are looking at.

Module 2 covered topics:

  • Drone components, communication systems, and vulnerabilities
  • Basic drone operations

Module 2 exercises:

  • Summary Quiz of module content. This uses the standard model to test retention of information post-instruction.

Module 3

Offensive Drone Operations

This module will be the reason students want to enroll in this course. This is where methodologies, exploits, and configurations will be discussed. Historical cases will be presented as well as lessons learned. This is the main module of the course and should be expected to constitute the majority of the course material.

Module 3 covered topics:

  • Drone-based reconnaissance
  • Payload delivery systems
  • Exploiting vulnerabilities from the air

Module 3 exercises:

  • Summary Quiz of module content. This uses the standard model to test retention of information post-instruction.

Module 4

Defensive Strategies Against Drones

This module is designed for the corporate or professional pentester. Oftentimes the purpose of a pentest is to identify your own security weaknesses and then implement measures to protect against or remediate those weaknesses. This module will discuss some currently available methods to protect against and respond to incidents involving Drones/UAS.

Module 4 covered topics:

  • Detection technologies
  • Mitigation strategies
  • Legal implications

Module 4 exercises:

  • Summary Quiz of module content. This uses the standard model to test retention of information post-instruction.

Final Exam

Final exam will consist of an equal mix of questions regarding to the four modules. All questions will be weighted the same.


Contact

Questions? Reach out to us at [email protected].

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023