The Internet of Pwned Things
Offered By: NDC Conferences via YouTube
Course Description
Overview
Explore the vulnerabilities and security risks of the Internet of Things (IoT) in this eye-opening conference talk. Delve into real-world examples of IoT failures, examining the types of vulnerabilities, exploitation methods, and their far-reaching impacts. Gain insights into the unprecedented challenges of digitizing and storing new classes of data in the cloud, as well as the risks associated with granting remote device control. Learn about the industry's necessary evolution to prevent future security incidents in IoT. Combining alarming facts with moments of humor, discover just how susceptible the Internet of Things has become to being "pwned" and understand the critical importance of addressing these security concerns.
Syllabus
The Internet of Pwned Things - Troy Hunt
Taught by
NDC Conferences
Related Courses
Unlocking Information Security II: An Internet PerspectiveTel Aviv University via edX Cybersecurity Capstone: Breach Response Case Studies
IBM via Coursera Complete Ethical Hacking Bootcamp
Udemy Cyber Security Advanced Persistent Threat Defender Preview
Udemy Performing Threat Modeling with the PASTA Methodology
Pluralsight