Outsmarting IoT Defense - The Hacker's Perspective
Offered By: Linux Foundation via YouTube
Course Description
Overview
Explore the world of IoT security from a hacker's perspective in this eye-opening keynote address. Gain insights into the limitations of current IoT defense strategies, including continuous patching, static analysis, encryption, and risk controls. Discover why these approaches often fall short in protecting devices from sophisticated attacks. Learn about innovative methods for achieving embedded, on-device runtime exploits protection that can immunize IoT devices against underlying vulnerabilities and provide zero-day protection. Drawing from the expertise of former IDF Unit 8200 exploit and attack specialists, understand how attackers can easily bypass traditional security measures and why a paradigm shift is necessary for building sustainable, secure IoT solutions. Delve into the potential of applying IT endpoint detection and response techniques to previously unprotected and unmanaged IoT edge devices, paving the way for more robust and effective IoT security practices.
Syllabus
Keynote: Outsmarting IoT Defense: The Hacker's Perspective - Natali Tshuva, Sternum IoT
Taught by
Linux Foundation
Tags
Related Courses
Embedded Systems - Shape The World: Microcontroller Input/OutputThe University of Texas at Austin via edX Model Checking
Chennai Mathematical Institute via Swayam Introduction to the Internet of Things and Embedded Systems
University of California, Irvine via Coursera Sistemas embebidos: Aplicaciones con Arduino
Universidad Nacional Autónoma de México via Coursera Quantitative Formal Modeling and Worst-Case Performance Analysis
EIT Digital via Coursera