Ethical Hacking: Hacking IoT Devices
Offered By: LinkedIn Learning
Course Description
Overview
Explore IoT security challenges, learn ethical hacking for IoT/OT devices, and outline strategies to manage & defend against ICS attacks, followed by best practice guidelines.
Syllabus
Introduction
- Hacking IoT and OT systems
- Getting the most from this course
- Hacking ethically
- Defining the IoT
- Gathering data
- Exchanging information
- Challenge: Enemybot
- Solution: Enemybot
- Outlining IoT threats
- Identifying OWASP IoT Top 10
- Reviewing IoT attacks
- Challenge: INDUSTROYER.V2
- Solution: INDUSTROYER.V2
- Describing IoT hacking
- Gathering Intel on IoT devices
- Evaluating IoT vulnerabilities
- Attacking IoT devices
- Gaining access to an IoT device
- Describing OT
- Listing ICS components
- OT technologies and protocols
- Recognizing the challenges of OT
- Using MITRE ATT&CK for ICS
- Pentesting OT systems
- Providing insights into OT attacks
- Seeking OT systems
- Searching for OT vulnerabilities
- Targeting OT systems
- Countering IoT attacks
- Managing IoT devices
- Developing a secure device
- Implementing Zero Trust
- Designing a secure framework
- Next steps
Taught by
Luciano Ferrari
Related Courses
Climate change and Indigenous People and local communitiesUniversitat Autònoma de Barcelona (Autonomous University of Barcelona) via Coursera Climate Adaptation for Human Health
Yale University via Coursera Fundamentos del Internet de las cosas (IoT): Seguridad I
Galileo University via edX MSc Cyber Security
Coventry University via FutureLearn Metasploit Training Course by Cybrary
Cybrary