Into the Mind of an IoT Hacker - How to Protect IoT Networks & Devices
Offered By: RSA Conference via YouTube
Course Description
Overview
Syllabus
Intro
IOT SECURITY CUSTOMER TYPES
HOW MANY IOT DEVICES ARE DEPLOYED INSIDE THE NETWORK?
SCANNING THE INTERNET FOR IOT DEVICES
IOT DEVICES ARE EASY TO HACK INTO
EXPLOIT IOT VULNERABILITIES
THE DARK SIDE OF SMART LIGHTING
TAKE CONTROL OVER SMART BUILDING
HACKING INTO AN ULTRASOUND MACHINE
IOT DEVICES POSE A HUGE SECURITY RISK
FROM DISCOVERY TO POLICY ENFORCEMNET
IDENTIFY EVERY IOT DEVICE ON THE ENTIRE NETWORK
GRANULAR IDENTITY DETAILS FOR EVERY IOT DEVICE
SEAMLESSLY TURN THE IOT INTELLIGENCE MAP INTO A NETWORK SECURITY POLICY
SAVE TIME AND EFFORT WITH AUTOMATED IOT POLICY BUILDER
ENFORCE THE IOT NETWORK POLICY
VIRTUAL PATCHING PROTECT DEVICES FROM KNOWN EXPLOITS
PREVENT ATTACKS WITH ON DEVICE RUNTIME PROTECTION
Taught by
RSA Conference
Related Courses
Master Mathematical Cryptography 2020: Crack Any CodeUdemy Cryptography from Scratch| Master Cryptography in Java
Udemy Information Security in Python
Udemy Cryptography
Caleb Curry via YouTube Linux for Programmers - Public-Private Key Authentication (RSA) and FTP
Tech with Tim via YouTube