Aerospace Cybersecurity: Satellite Hacking (W53) [PentestMag]

0.00

This course teaches the foundations of satellite cybersecurity by guiding you through the reconnaissance, communication dissection, decoding, and vulnerability analysis of satellite systems through interactive activities and tutorials. Learn about the underlying concepts of what makes satellite network infrastructure function and apply your knowledge to conduct digital forensics on real life satellites in orbit.

-
+

Specs

Category: Tags: ,

Description

This course teaches the foundations of satellite cybersecurity by guiding you through the reconnaissance, communication dissection, decoding, and vulnerability analysis of satellite systems through interactive activities and tutorials. Learn about the underlying concepts of what makes satellite network infrastructure function and apply your knowledge to conduct digital forensics on real life satellites in orbit.

What skills will you gain?​​ ​​​

  • A deep understanding of satellite communication systems
  • Space-based OSINT skills
  • Using Python scripts to retrieve satellite telemetry
  • Digital forensics techniques with satellites
  • Decoding and identifying satellite communication protocols
  • Detecting for satellite hacking

What will you learn about?


  1. Orbital Mechanics
  2. Satellite Reconnaissance
  3. Decoding Satellite Communication
  4. Satellite On-Board Systems
  5. Listening to Satellites via Radio Frequencies
  6. Vulnerability Analysis of Satellites
  7. Common Attacks employed against satellites
  8. Detection of satellite hacking

What tools will you use?

  • A variety of online OSINT tools such as N2YO and Celestrak
  • Python

Course format: 

  • Self-paced
  • Pre-recorded
  • Accessible even after you finish the course
  • No preset deadlines
  • Materials are video, labs, and text
  • All videos captioned

Reviews

There are no reviews yet.

Be the first to review “Aerospace Cybersecurity: Satellite Hacking (W53) [PentestMag]”

Your email address will not be published. Required fields are marked *