IoT Network

Internet of Things (IoT) Network Analysis

Price: € 3.950.- (excl. VAT/BTW/MwSt/TVA)
Category: Network / Training, Wireshark training
Format: Classroom, Virtual / In-house
This course is for Networking and Security personnel who need to develop packet investigation techniques by studying the IoT and Home Automation Protocols using Wireshark and other OpenSource Analysis tools. Successful completion of this course provides these individuals with a.. read more below
Amsterdam / In-House / Virtual
T.B.A. 2025
08:30-16:30
duration: 5 days
5-12 class size
English

This course is for Networking and Security personnel who need to develop packet investigation techniques by studying the IoT and Home Automation Protocols using Wireshark and other OpenSource Analysis tools. Successful completion of this course provides these individuals with a pathway into the Network and Forensics Analysis field. Practical analysis and troubleshooting of such advanced technologies encompass the skills of capturing data and the ability to discern unusual patterns hidden within seemingly normal network traffic.

  • Specialized and advanced packet capture tips combined with specialized techniques, including data traffic reconstruction and viewing
  • Recognition, analysis and threat recognition for a many of the next generation IoT technologies including, but not limited to: IEEE 802.15 Bluetooth / IEEE 802.15.4 ZigBee / IEEE 802.16e WiMAX / Home RF / ZWave / RFID / Infrared / PBCC / DMX / DMX 512 / 3G / 4G / 5G

This course is designed for Networking and Security personnel that need to develop a set of focused packet investigation techniques through study of the  IoT networking Protocols using Wireshark and other Open-Source Analysis tools.

Key areas of study include: Specialized and advanced packet capture tips combined with specialized techniques including data traffic reconstruction and viewing. Operation, analysis and threat recognition for a many of the next generation Cloud and IoT technologies including Cloud Computing / Virtualization / IEEE 802.15 Bluetooth / IEEE 802.15.4 ZigBee / IEEE 802.16e WiMAX / Home RF / ZWave / RFID / Infrared / PBCC / 3G / 4G / 5G. Emphasis is placed on Real-World analysis techniques.

Successful completion of this course will provide these individuals with a path-way into the field of both Network and Forensics Analysis.

Section 1: Introduction to IoT Network Analysis

• Logistics

• Internet of Things (IoT) Network analysis challenges

 

Section 2: Recap – Collecting the Data – Data Capture

Data Collection

• Configuring Wireshark

• Configurations – LAN vs. IoT

• USBPcap / Androiddump

• Bluetooth capture features

• Using capture filters to capture specific types of traffic

• Location – How Network Infrastructure Devices Affect Network Analysis

• Stealth / Silent Collection of Data – Tips & Techniques

• Real-time vs. Post-Capture Analysis

• IoT Device Analysis

• WiFi features & WEP / WPA / WPA2 Decryption

 

Is It Good or Bad – The Role of Baselines in IoT Analysis

• What’s Normal vs. Abnormal – The Role of Baseline Files

• Building a Baseline Library – Where Do I go to Find Samples?

 

Section 3: IoT Technologies

Overview and Introduction to IoT-Based Technologies

• IoT Terminology & Technologies

• IoT Enabling Technologies

• Wired – Power Line Communications (PLC)

• IEEE 802.11ah HaLow Short, medium, and long-Range Wireless

• Medical (IoTM) and Body Area Networks (BAN)

 

IoT Architecture, Routing, and Connectivity

• Nomenclature, Terminology, and IOT Architecture

• Star, Tree, Ring, and Mesh

• IoT Communication Models

• IoT Ecosystems

• Emerging IoT Generation Technologies

• IoT Hardware vs. Software

• Thread Protocol & IPv6 Networking

• Overview & Analysis

• ZigBee & IPv6 Networking

 

IoT Conversations and Activities

• Analysing IoT Conversations and Activities to Determine Unusual Activity

• Analysing Latency and Throughput to recognize suspicious user traffic

• Using Statistical Analysis to Isolate & Identify Suspect Conversations

• IoT Network Analysis Methodology

• Answering the Key Troubleshooting and Analysis Questions – A sample 6 Step methodology for IoT-based Network Analysis

 

Diagraming Conversations – A Picture is worth 1024 Words

• Related Packet & Intelligent Scrollbar features

• Constructing a Troubleshooting and Analysis Diagram Tips & Techniques

 

Special Considerations for Analyzing IoT WiFi-Based Traffic

• IoT / WiFi Fundamentals

• Frequency, Bandwidth & Channel Considerations

• Spread Spectrum Technologies

• Frequency Hopping Spread Spectrum (FHSS)

• Direct Sequence Spread Spectrum (DSSS)

• Orthogonal Frequency Division Multiplexing (OFDM)

• Spatial Division Multiplexing (SDM)

• Minimum Frequency Shift Keying (MSK)

• IoT MAC Layer

• Finding a Service / Device Set

• Connecting, Authenticating & Associating to a Set

• Moving Between and disconnecting from Sets

• IoT / Wireless Frame Addressing

• IoT / WiFi Frame Translation

 

Key IoT Technologies: SoHo and IoT

• Structure, Operation, and Analysis of Key IoT Technologies

• IEEE 802.15 Bluetooth Classic. Bluetooth LE

• IEEE 802.15.4 ZigBee

• IEEE 802.16e WiMAX

• Home RF

• Z-Wave / DTLS

• DMX / DMX 512

• RFID / Near Field Communications (NFC)

• Infrared / LiFi ix. PBCC

• BACnet / Modbus

• IP

• SIP

• 3G / 4G / 5G

 

IoT Security – Vulnerabilities, Threats, and Examples of Intrusion Signatures

• Overview of IoT-based Security Vulnerabilities

• The Key Issue – Competing Standards and Lack of Regulations

• Special Considerations – IoT Medical Equipment

• Special Considerations – IoT Home Automation

• Rouge IoT Devices

• UPNP Exploitation

• Man-in-the-Middle IoT Devices

• Malware / Ransomware

• IoT Denial of Service (DoS / DDoS) Attacks

• IoT Bots / Botnets

• Fixing the Problem

• Security Recommendations

• IEEE 802.1x Radius Overview

• CCMP Authentication and Encryption protocol

• WiFi / IoT Encryption

• Wired Equivalency Protocol (WEP)

• WiFi Protected Access (WPA / WPA2)

• Bluetooth Classis / Bluetooth LE Encryption

• ZigBee Encryption

Student qoutes

"It's sure the most interesting course that i have followed"

- Karin van der Plas

Course: TCP/IP Analysis and Troubleshooting with Wireshark

"It was a very very very interesting course, and done by the top guy"

- Matthew Steenwijk

Course: VoIP Network Analysis

"It was a real pleasure to receive the Wireshark training from a very dedicated trainer"

- Wim de Vries

Course: Voice & Video over IP Network Analysis Using Wireshark

"I thought I already knew Wireshark. I was wrong, very wrong"

- Jeroen Valkonet

Course: TCP/IP Analysis and Troubleshooting with Wireshark

"This course is a must have for everyone in IT"

- Johan den Besten

Course: TCP/IP Analysis and Troubleshooting with Wireshark

"Great for network analyses or forensic investigations"

- Sven Schneider

Course: Masterclass – Advanced Network & Intro to Security Analysis

"By far the very best course I ever took"

- Joachim van Doeselaar

Course: TCP/IP Analysis and Troubleshooting with Wireshark

"If there’s a packet, it can be WireSharked!!"

- Elena Petrova

Course: WiFi & Wireless Network Analysis Using Wireshark

"Extremely satisfied with the training. Very helpful instructor and great teaching methods"

- Lars Mikkelsen

Course: Masterclass – Advanced Network & Intro to Security Analysis

More courses within category Network / Training

Amsterdam / In-House / Virtual
duration: 5 days
T.B.A. 2025
This course is for Networking and Security personnel who must develop packet investigation techniques by studying the WiFi and Wireless Networking Protocols (IEEE 802.11a, b, g, n, ac, ad, az)..
Amsterdam / In-House / Virtual
duration: 5 days
T.B.A. 2025
Network Forensics Analysis encompasses the skills of capturing suspicious data and the ability to discern unusual patterns hidden within seemingly normal network traffic. This course provides the student with a..
Amsterdam / In-House / Virtual
duration: 5 days
T.B.A. 2025
This course is for Networking and Security personnel who need to develop a set of packet investigation techniques to support recognition, analysis, and threat recognition for many of the next..
duration: 5 days
T.B.A. 2025
This course will provide the student with a set of analysis techniquesfocusing on the use of vendor-neutral, Open-Source Tools to provide insight intothe following areas:
Amsterdam / Hoofddorp / The Netherlands
duration: 5 days
6
Oct
- 10
Oct
2025
Effective Network TCP/IP Analysis and Optimization encompasses the skills of not only capturing data, but also the ability to discern the key patterns hidden within the flood of network traffic...
duration: 5 days
T.B.A. 2025
The realities of modern traffic analysis require interpreting encrypted network traffic correctly. A detailed knowledge of how key protocols such as HTTP can provide valuable insights into what is happening..

Sign up and register for Internet of Things (IoT) Network Analysis

A course only takes place if there is sufficient participation.
*
= required

Do you want to register for more than one course? Click here

Request information for Internet of Things (IoT) Network Analysis

*
= required

Do you want to request information for more than one course? Click here