YoVDO

Infecting Internet of Things

Offered By: DefCamp via YouTube

Tags

DefCamp Courses Vulnerability Assessment Courses Internet of Things Security Courses

Course Description

Overview

Explore the vulnerabilities of Internet of Things (IoT) devices in this 43-minute conference talk from DefCamp 2016. Delve into the world of cybersecurity as experts discuss potential infection vectors and security risks associated with IoT technology. Gain insights into the latest research and practices in the INFOSEC field, specifically focusing on the challenges posed by the growing interconnectivity of everyday devices. Learn about hands-on approaches to identifying and mitigating threats in IoT ecosystems. Discover why this topic is crucial for decision makers, security specialists, entrepreneurs, and developers alike in the rapidly evolving landscape of information security. Access additional resources, including slides and presentations, through the provided DefCamp archive link to further enhance your understanding of IoT security concerns.

Syllabus

DefCamp 2016 - INFECTING INTERNET OF THINGS


Taught by

DefCamp

Related Courses

The Model of Post-Quantum Signature Using Verkle Tree - DefCamp - 2022
DefCamp via YouTube
The Anatomy of Wiper Malware - DefCamp - 2022
DefCamp via YouTube
Internet Balkanization in an Era of Military Conflict - Dan Demeter - DefCamp - 2022
DefCamp via YouTube
How We Analyzed and Built an Exploit PoC for CVE-2022-24086, a Magento RCE - Catalin Filip - DefCamp - 2022
DefCamp via YouTube
To Log, or Not to Log! That Is the Question - DefCamp - 2022
DefCamp via YouTube