Ethical Hacking: Hacking IoT Devices
Offered By: LinkedIn Learning
Course Description
Overview
Explore IoT security challenges, learn ethical hacking for IoT/OT devices, and outline strategies to manage & defend against ICS attacks, followed by best practice guidelines.
Syllabus
Introduction
- Hacking IoT and OT systems
- Getting the most from this course
- Hacking ethically
- Defining the IoT
- Gathering data
- Exchanging information
- Challenge: Enemybot
- Solution: Enemybot
- Outlining IoT threats
- Identifying OWASP IoT Top 10
- Reviewing IoT attacks
- Challenge: INDUSTROYER.V2
- Solution: INDUSTROYER.V2
- Describing IoT hacking
- Gathering Intel on IoT devices
- Evaluating IoT vulnerabilities
- Attacking IoT devices
- Gaining access to an IoT device
- Describing OT
- Listing ICS components
- OT technologies and protocols
- Recognizing the challenges of OT
- Using MITRE ATT&CK for ICS
- Pentesting OT systems
- Providing insights into OT attacks
- Seeking OT systems
- Searching for OT vulnerabilities
- Targeting OT systems
- Countering IoT attacks
- Managing IoT devices
- Developing a secure device
- Implementing Zero Trust
- Designing a secure framework
- Next steps
Taught by
Luciano Ferrari
Related Courses
Web Science: How the Web Is Changing the WorldUniversity of Southampton via FutureLearn Develop Java Embedded Applications Using a Raspberry Pi
Oracle via Independent Introducción a Raspberry Pi (Ver-2)
Galileo University via Independent Fog Networks and the Internet of Things
Princeton University via Coursera Digital Media and Marketing Principles
University of Illinois at Urbana-Champaign via Coursera