YoVDO

IoT Botnets - How Do They Work?

Offered By: DefCamp via YouTube

Tags

DefCamp Courses

Course Description

Overview

Explore the inner workings of IoT botnets in this informative conference talk from DefCamp 2017. Delve into the mechanics and operational aspects of botnets targeting Internet of Things devices, gaining valuable insights into this growing cybersecurity threat. Learn about the vulnerabilities exploited by attackers, the propagation methods used, and the potential impact of these malicious networks. Understand the challenges faced by security professionals in detecting and mitigating IoT botnet attacks. Discover the latest research and practices in the field of Information Security, presented by experts at one of Central and Eastern Europe's most prominent hacking conferences. Enhance your knowledge of cybersecurity trends and prepare to defend against evolving threats in the rapidly expanding IoT landscape.

Syllabus

DefCamp 2017 - IoT botnets? How do they work?


Taught by

DefCamp

Related Courses

The Model of Post-Quantum Signature Using Verkle Tree - DefCamp - 2022
DefCamp via YouTube
The Anatomy of Wiper Malware - DefCamp - 2022
DefCamp via YouTube
Internet Balkanization in an Era of Military Conflict - Dan Demeter - DefCamp - 2022
DefCamp via YouTube
How We Analyzed and Built an Exploit PoC for CVE-2022-24086, a Magento RCE - Catalin Filip - DefCamp - 2022
DefCamp via YouTube
To Log, or Not to Log! That Is the Question - DefCamp - 2022
DefCamp via YouTube