YoVDO

Are You Sure - You Are Alone? Pwning IoT-CCTV Devices!

Offered By: WEareTROOPERS via YouTube

Tags

TROOPERS Courses Cybersecurity Courses IoT Device Security Courses Firmware Analysis Courses

Course Description

Overview

Explore the vulnerabilities of IoT-CCTV devices in this 22-minute conference talk from TROOPERS18/NGI18. Delve into the intricacies of device security, file systems, and firmware as speaker Robert Kugler demonstrates the process of exploiting these systems. Gain insights into the potential impact of such vulnerabilities and understand the importance of securing IoT devices in the modern connected world.

Syllabus

Introduction
The device
The file system
The firmware
The exploit
Impact


Taught by

WEareTROOPERS

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network