Ethical Hacking: Hacking IoT Devices
Offered By: LinkedIn Learning
Course Description
Overview
Explore IoT security challenges, learn ethical hacking for IoT/OT devices, and outline strategies to manage & defend against ICS attacks, followed by best practice guidelines.
Syllabus
Introduction
- Hacking IoT and OT systems
- Getting the most from this course
- Hacking ethically
- Defining the IoT
- Gathering data
- Exchanging information
- Challenge: Enemybot
- Solution: Enemybot
- Outlining IoT threats
- Identifying OWASP IoT Top 10
- Reviewing IoT attacks
- Challenge: INDUSTROYER.V2
- Solution: INDUSTROYER.V2
- Describing IoT hacking
- Gathering Intel on IoT devices
- Evaluating IoT vulnerabilities
- Attacking IoT devices
- Gaining access to an IoT device
- Describing OT
- Listing ICS components
- OT technologies and protocols
- Recognizing the challenges of OT
- Using MITRE ATT&CK for ICS
- Pentesting OT systems
- Providing insights into OT attacks
- Seeking OT systems
- Searching for OT vulnerabilities
- Targeting OT systems
- Countering IoT attacks
- Managing IoT devices
- Developing a secure device
- Implementing Zero Trust
- Designing a secure framework
- Next steps
Taught by
Luciano Ferrari
Related Courses
Ethical HackingIndian Institute of Technology, Kharagpur via Swayam Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax MSc Cyber Security
Coventry University via FutureLearn Network Security - Introduction to Network Security
New York University (NYU) via edX Network Security - Advanced Topics
New York University (NYU) via edX