YoVDO

Metasploit Hardware Bridge Hacking

Offered By: WEareTROOPERS via YouTube

Tags

TROOPERS Courses Ethical Hacking Courses Metasploit Courses IoT security Courses Hardware Hacking Courses

Course Description

Overview

Explore hardware hacking techniques using the Metasploit Hardware Bridge in this conference talk from TROOPERS17. Learn how to leverage this powerful tool for IoT security testing and vulnerability assessment. Gain insights into the latest developments in hardware exploitation and discover practical applications for securing connected devices. Delve into the world of IoT security and enhance your skills in identifying and mitigating hardware-based vulnerabilities.

Syllabus

TR17 - Metasploit Hardware Bridge Hacking - Craig Smith


Taught by

WEareTROOPERS

Related Courses

A developer's guide to the Internet of Things (IoT)
IBM via Coursera
Enterprise and Infrastructure Security
New York University (NYU) via Coursera
Getting Started with the Internet of Things (IoT)
Microsoft via edX
AWS IoT: Developing and Deploying an Internet of Things
Amazon Web Services via edX
Components And Applications Of Internet Of Things
Indian Institute of Technology Patna via Swayam