Outsmarting IoT Defense - The Hacker's Perspective
Offered By: Linux Foundation via YouTube
Course Description
Overview
Explore the world of IoT security from a hacker's perspective in this eye-opening keynote address. Gain insights into the limitations of current IoT defense strategies, including continuous patching, static analysis, encryption, and risk controls. Discover why these approaches often fall short in protecting devices from sophisticated attacks. Learn about innovative methods for achieving embedded, on-device runtime exploits protection that can immunize IoT devices against underlying vulnerabilities and provide zero-day protection. Drawing from the expertise of former IDF Unit 8200 exploit and attack specialists, understand how attackers can easily bypass traditional security measures and why a paradigm shift is necessary for building sustainable, secure IoT solutions. Delve into the potential of applying IT endpoint detection and response techniques to previously unprotected and unmanaged IoT edge devices, paving the way for more robust and effective IoT security practices.
Syllabus
Keynote: Outsmarting IoT Defense: The Hacker's Perspective - Natali Tshuva, Sternum IoT
Taught by
Linux Foundation
Tags
Related Courses
A developer's guide to the Internet of Things (IoT)IBM via Coursera Enterprise and Infrastructure Security
New York University (NYU) via Coursera Getting Started with the Internet of Things (IoT)
Microsoft via edX AWS IoT: Developing and Deploying an Internet of Things
Amazon Web Services via edX Components And Applications Of Internet Of Things
Indian Institute of Technology Patna via Swayam