YoVDO

The Internet of Pwned Things

Offered By: NDC Conferences via YouTube

Tags

NDC Conferences Courses Cybersecurity Courses Vulnerability Assessment Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the vulnerabilities and security risks of the Internet of Things (IoT) in this 37-minute conference talk by Troy Hunt at NDC Conferences. Delve into real-world examples of IoT failures, examining the types of vulnerabilities, exploitation methods, and their impact on users and businesses. Gain insights into the unprecedented challenges of digitizing and storing new classes of data in the cloud, as well as the risks associated with granting remote device control. Learn about the industry's necessary evolution to prevent future security incidents in IoT. Discover both alarming and amusing instances of IoT vulnerabilities, highlighting the extent to which the Internet of Things is becoming compromised. Prepare for a thought-provoking discussion on the critical importance of securing our increasingly connected world.

Syllabus

Locknote: The Internet of Pwned Things - Troy Hunt


Taught by

NDC Conferences

Related Courses

Health Informatics: Data and Interoperability Standards
Georgia Institute of Technology via edX
Fractal Architecture
NDC Conferences via YouTube
Strangling the Monolith - Applied Patterns & Practices from the Trenches
NDC Conferences via YouTube
Refactoring Is Not Just Clickbait
NDC Conferences via YouTube
Amazing Algorithms for Solving Problems in Software
NDC Conferences via YouTube