Outsmarting IoT Defense - The Hacker's Perspective
Offered By: Linux Foundation via YouTube
Course Description
Overview
Explore the world of IoT security from a hacker's perspective in this eye-opening keynote address. Gain insights into the limitations of current IoT defense strategies, including continuous patching, static analysis, encryption, and risk controls. Discover why these approaches often fall short in protecting devices from sophisticated attacks. Learn about innovative methods for achieving embedded, on-device runtime exploits protection that can immunize IoT devices against underlying vulnerabilities and provide zero-day protection. Drawing from the expertise of former IDF Unit 8200 exploit and attack specialists, understand how attackers can easily bypass traditional security measures and why a paradigm shift is necessary for building sustainable, secure IoT solutions. Delve into the potential of applying IT endpoint detection and response techniques to previously unprotected and unmanaged IoT edge devices, paving the way for more robust and effective IoT security practices.
Syllabus
Keynote: Outsmarting IoT Defense: The Hacker's Perspective - Natali Tshuva, Sternum IoT
Taught by
Linux Foundation
Tags
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network