Description
Ethical Hacking: Hacking IoT Devices
Intermediate
2h 3m
Course description
The number of IoT (Internet of Things) devices deployed is increasing exponentially, which presents significant security challenges. In this course, Lisa Bock covers topics related to the IoT and OT hacking domain from the CEH body of knowledge. Lisa dives into the myriad of security challenges that the IoT faces, highlighting the importance of conducting ethical hacking to unearth vulnerabilities within IoT and operational technology (OT) devices. The course covers strategies for managing OT and industrial control systems (ICS). Furthermore, Lisa outlines methods for executing attacks on IoT/OT systems along with ways to safeguard systems against potential attacks, to ensure participants are well-equipped to protect these technologies. To help apply these concepts, Lisa provides a list of resources for best practice frameworks and guidance on securing IoT/OT systems. At the end of the course, you will have a robust arsenal to navigate the complex landscape of IoT security.
Introduction
Hacking IoT and OT systems
56s
Preview
Getting the most from this course
59s
Preview
Hacking ethically
55s
Preview
1. Understanding the IoT
Defining the IoT
3m 15s
Preview
Locked content
Gathering data
3m 44s
Locked content
Exchanging information
4m 24s
Locked content
Challenge: Enemybot
57s
Locked content
Solution: Enemybot
3m 21s
Chapter Quiz
3 questions
2. Recognizing IoT Security Issues
Outlining IoT threats
3m 57s
Preview
Locked content
Identifying OWASP IoT Top 10
4m 8s
Locked content
Reviewing IoT attacks
3m 50s
Locked content
Challenge: INDUSTROYER.V2
1m 26s
Locked content
Solution: INDUSTROYER.V2
4m 44s
Chapter Quiz
3 questions
3. Hacking the IoT
Describing IoT hacking
3m 32s
Preview
Locked content
Gathering Intel on IoT devices
5m 17s
Locked content
Evaluating IoT vulnerabilities
6m 43s
Locked content
Attacking IoT devices
5m 22s
Locked content
Gaining access to an IoT device
3m 41s
Chapter Quiz
5 questions
4. Controlling Systems with OT
Locked content
Describing OT
3m 38s
Locked content
Listing ICS components
4m 24s
Locked content
OT technologies and protocols
3m 9s
Locked content
Recognizing the challenges of OT
4m 30s
Locked content
Using MITRE ATT&CK for ICS
4m 22s
Chapter Quiz
7 questions
5. Exploiting OT Systems
Locked content
Pentesting OT systems
4m 53s
Locked content
Providing insights into OT attacks
3m 54s
Locked content
Seeking OT systems
4m 50s
Locked content
Searching for OT vulnerabilities
3m 21s
Locked content
Targeting OT systems
3m 53s
Chapter Quiz
5 questions
6. Defending against Attacks
Locked content
Countering IoT attacks
3m 48s
Locked content
Managing IoT devices
4m 48s
Locked content
Developing a secure device
2m 43s
Locked content
Implementing Zero Trust
4m 41s
Locked content
Designing a secure framework
3m 56s
Conclusion
Locked content
Next steps
1m 28s
Reviews
There are no reviews yet.