Skip navigation

Understanding Bluetooth and NFC attacks

Understanding Bluetooth and NFC attacks: CISSP Cert Prep: 4 Communication and Network Security (2015)
Understanding Bluetooth and NFC attacks: CISSP Cert Prep: 4 Communication and Network Security (2015)

Today’s smartphones use near field communication technology for a wide variety of purposes. This short range radio communications method allows the use of headsets, mobile payments, external speakers, keyboards and all sorts of other uses. As with any technology, however, the use of NFC communications provides attackers with another pathway to exploit security vulnerabilities. Learn about common proximity attacks including NFC attacks, Bluejacking and Bluesnarfing.

Resume Transcript Auto-Scroll
Skill Level Advanced
4h 2m
Duration
242,676
Views
Show More Show Less
Skills covered in this course
Network Administration Security IT CISSP

Continue Assessment

You started this assessment previously and didn't complete it. You can pick up where you left off, or start over.

Start My Free Month

Start your free month on LinkedIn Learning, which now features 100% of Lynda.com courses. Develop in-demand skills with access to thousands of expert-led courses on business, tech and creative topics.

Start My Free Month