Are You Sure - You Are Alone? Pwning IoT-CCTV Devices!
Offered By: WEareTROOPERS via YouTube
Course Description
Overview
Explore the vulnerabilities of IoT-CCTV devices in this 22-minute conference talk from TROOPERS18/NGI18. Delve into the intricacies of device security, file systems, and firmware as speaker Robert Kugler demonstrates the process of exploiting these systems. Gain insights into the potential impact of such vulnerabilities and understand the importance of securing IoT devices in the modern connected world.
Syllabus
Introduction
The device
The file system
The firmware
The exploit
Impact
Taught by
WEareTROOPERS
Related Courses
Security Principles(ISC)² via Coursera A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera FinTech for Finance and Business Leaders
ACCA via edX Access Control Concepts
(ISC)² via Coursera Access Controls
(ISC)² via Coursera