Ethical Hacking: Hacking IoT Devices
Offered By: LinkedIn Learning
Course Description
Overview
Find out how to make IoT devices more secure by learning about the technologies and protocols used and how to implement countermeasures to address vulnerabilities.
Syllabus
Introduction
- Understand the hacking of IoT devices
- What you should know
- How the Internet of Things works
- IoT technologies and protocols
- IoT communication models
- Challenges of IoT
- OWASP top ten vulnerabilities
- IoT attack areas
- IoT attacks
- IoT hacking methodology
- IoT hacking demonstration, part 1
- IoT hacking demonstration, part 2
- Securing IoT devices
- Next steps
Taught by
Luciano Ferrari
Related Courses
A developer's guide to the Internet of Things (IoT)IBM via Coursera Enterprise and Infrastructure Security
New York University (NYU) via Coursera Getting Started with the Internet of Things (IoT)
Microsoft via edX AWS IoT: Developing and Deploying an Internet of Things
Amazon Web Services via edX Components And Applications Of Internet Of Things
Indian Institute of Technology Patna via Swayam