Weekly study10 hours
Ethical Hacking CAN Protocol
Is it easy to reverse engineer CAN data?
On this course, through open source simulation tools, CAN data will be captured and a potential replay attack will be demonstrated.
A systematic appreciation will also be demonstrated for privacy and policy issues regarding the use of personal and sensitive data generated on modern automotive platforms, in the context of sensing, communication and storage.
- Kali Linux
- Replay attack
Learning on this course
You can take this self-guided course and learn at your own pace. On every step of the course you can meet other learners, share your ideas and join in with active discussions in the comments.
What will you achieve?
By the end of the course, you‘ll be able to...
- Demonstrate practical attacks on CAN protocol
- Record CAN data and understand its content
- Explore the ability to reverse engineer captured CAN data
- Perform replay attack on CAN protocol
Who is the course for?
MSc Cyber Security students.
Please note that the individuals detailed in the ‘Who will you learn with?’ section below, are current staff members and may be subject to change.