YoVDO

Ethical Hacking: Hacking IoT Devices

Offered By: LinkedIn Learning

Tags

Ethical Hacking Courses Internet of Things Courses IoT security Courses Vulnerability Assessment Courses

Course Description

Overview

Explore IoT security challenges, learn ethical hacking for IoT/OT devices, and outline strategies to manage & defend against ICS attacks, followed by best practice guidelines.

Syllabus

Introduction
  • Hacking IoT and OT systems
  • Getting the most from this course
  • Hacking ethically
1. Understanding the IoT
  • Defining the IoT
  • Gathering data
  • Exchanging information
  • Challenge: Enemybot
  • Solution: Enemybot
2. Recognizing IoT Security Issues
  • Outlining IoT threats
  • Identifying OWASP IoT Top 10
  • Reviewing IoT attacks
  • Challenge: INDUSTROYER.V2
  • Solution: INDUSTROYER.V2
3. Hacking the IoT
  • Describing IoT hacking
  • Gathering Intel on IoT devices
  • Evaluating IoT vulnerabilities
  • Attacking IoT devices
  • Gaining access to an IoT device
4. Controlling Systems with OT
  • Describing OT
  • Listing ICS components
  • OT technologies and protocols
  • Recognizing the challenges of OT
  • Using MITRE ATT&CK for ICS
5. Exploiting OT Systems
  • Pentesting OT systems
  • Providing insights into OT attacks
  • Seeking OT systems
  • Searching for OT vulnerabilities
  • Targeting OT systems
6. Defending against Attacks
  • Countering IoT attacks
  • Managing IoT devices
  • Developing a secure device
  • Implementing Zero Trust
  • Designing a secure framework
Conclusion
  • Next steps

Taught by

Luciano Ferrari

Related Courses

Climate change and Indigenous People and local communities
Universitat Autònoma de Barcelona (Autonomous University of Barcelona) via Coursera
Climate Adaptation for Human Health
Yale University via Coursera
Fundamentos del Internet de las cosas (IoT): Seguridad I
Galileo University via edX
MSc Cyber Security
Coventry University via FutureLearn
Metasploit Training Course by Cybrary
Cybrary