YoVDO

Ethical Hacking: Hacking IoT Devices

Offered By: LinkedIn Learning

Tags

Ethical Hacking Courses Internet of Things Courses IoT security Courses Vulnerability Assessment Courses

Course Description

Overview

Explore IoT security challenges, learn ethical hacking for IoT/OT devices, and outline strategies to manage & defend against ICS attacks, followed by best practice guidelines.

Syllabus

Introduction
  • Hacking IoT and OT systems
  • Getting the most from this course
  • Hacking ethically
1. Understanding the IoT
  • Defining the IoT
  • Gathering data
  • Exchanging information
  • Challenge: Enemybot
  • Solution: Enemybot
2. Recognizing IoT Security Issues
  • Outlining IoT threats
  • Identifying OWASP IoT Top 10
  • Reviewing IoT attacks
  • Challenge: INDUSTROYER.V2
  • Solution: INDUSTROYER.V2
3. Hacking the IoT
  • Describing IoT hacking
  • Gathering Intel on IoT devices
  • Evaluating IoT vulnerabilities
  • Attacking IoT devices
  • Gaining access to an IoT device
4. Controlling Systems with OT
  • Describing OT
  • Listing ICS components
  • OT technologies and protocols
  • Recognizing the challenges of OT
  • Using MITRE ATT&CK for ICS
5. Exploiting OT Systems
  • Pentesting OT systems
  • Providing insights into OT attacks
  • Seeking OT systems
  • Searching for OT vulnerabilities
  • Targeting OT systems
6. Defending against Attacks
  • Countering IoT attacks
  • Managing IoT devices
  • Developing a secure device
  • Implementing Zero Trust
  • Designing a secure framework
Conclusion
  • Next steps

Taught by

Luciano Ferrari

Related Courses

Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax
MSc Cyber Security
Coventry University via FutureLearn
Network Security - Introduction to Network Security
New York University (NYU) via edX
Network Security - Advanced Topics
New York University (NYU) via edX