Ethical Hacking: Hacking IoT and OT
Offered By: Pluralsight
Course Description
Overview
The past few years have seen the explosion in IoT and OT devices that connect us to the internet, and hackers took notice. This course will teach you the ethical hacking skills needed for the CEH 312-50 exam
IoT solutions are used in various industries, including healthcare, building management, agriculture, energy, and transportation. As the loT evolves, new technologies and services provided by various vendors will significantly influence businesses, resulting in numerous security problems. In this course, Ethical Hacking: Hacking IoT and OT, you’ll learn the skills needed to identify how attackers will approach this vector. First, you’ll explore the concepts of IoT and OT devices. Next, you’ll discover the various attacks and hacking methodologies used by attackers. Finally, you’ll learn how to use the countermeasures needed to protect your devices. When you’re finished with this course, you’ll have the skills and knowledge of security professionals needed for the CEH 312-50 exam.
IoT solutions are used in various industries, including healthcare, building management, agriculture, energy, and transportation. As the loT evolves, new technologies and services provided by various vendors will significantly influence businesses, resulting in numerous security problems. In this course, Ethical Hacking: Hacking IoT and OT, you’ll learn the skills needed to identify how attackers will approach this vector. First, you’ll explore the concepts of IoT and OT devices. Next, you’ll discover the various attacks and hacking methodologies used by attackers. Finally, you’ll learn how to use the countermeasures needed to protect your devices. When you’re finished with this course, you’ll have the skills and knowledge of security professionals needed for the CEH 312-50 exam.
Syllabus
- Course Overview 2mins
- Investigating IoT and OT Concepts 47mins
- Reviewing IoT and OT Attacks 27mins
- Understanding IoT and OT Hacking Methodologies 15mins
- Exploring IoT and OT Hacking Tools 27mins
- Implementing Countermeasures 11mins
- Course Summary 1min
Taught by
Dale Meredith
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network