Power BI Fundamentals - Create visualizations and dashboards from scratch
Free courses from frontend to fullstack and AI
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a groundbreaking DEF CON 32 conference talk that unveils a seven-year research investigation into HID Global's iCLASS SE electronic physical access control platform. Delve into the complex reverse engineering process of hardware, firmware, and software elements that exposed critical security vulnerabilities in one of the world's most widely-deployed access control systems. Learn how researchers discovered implementation flaws and pitfalls that compromised the chain of trust, ultimately leading to the extraction of sensitive cryptographic keys from CC EAL 5+ accredited secure elements. Gain valuable insights into technical and operational mitigation strategies to help organizations identify and reduce security risks in their access control systems. Perfect for security researchers, system administrators, and professionals interested in physical security and cryptographic implementations.
Syllabus
DEF CON 32 - Hi-Intensity Deconstruction: Chronicles of a Cryptographic Heist - Javadi, Levy, Draffe
Taught by
DEFCONConference