Skip navigation

On September 14th, 2017, we published revised versions of our Privacy Policy, Terms of Service and Website Use Policy and published a Cookie Policy. Your continued use of Lynda.com means you agree to these revised documents, so please take a few minutes to read and understand them.

Understanding Bluetooth and NFC attacks

Understanding Bluetooth and NFC attacks: CISSP Cert Prep: 4 Communication and Network Security
Understanding Bluetooth and NFC attacks: CISSP Cert Prep: 4 Communication and Network Security

Today’s smartphones use near field communication technology for a wide variety of purposes. This short range radio communications method allows the use of headsets, mobile payments, external speakers, keyboards and all sorts of other uses. As with any technology, however, the use of NFC communications provides attackers with another pathway to exploit security vulnerabilities. Learn about common proximity attacks including NFC attacks, Bluejacking and Bluesnarfing.

Resume Transcript Auto-Scroll
Skill Level Advanced
4h 2m
Duration
140,978
Views
Show More Show Less
Skills covered in this course
Network Administration Security IT CISSP

Continue Assessment

You started this assessment previously and didn't complete it. You can pick up where you left off, or start over.

Start Your Free Trial Now

Start your free trial now, and begin learning software, business and creative skills—anytime, anywhere—with video instruction from recognized industry experts.

Start Your Free Trial Now