Ethical Hacking-Hacking IoT Devices [CEH v12]

Original price was: $ 15.00.Current price is: $ 4.00.

-73%

Sale Price: 4, Regular Price: 15, Size: 235 MB, Duration: 2.03, Number of Video Lessons: 34, Brand: Expert Training, Language: English, Instant Download, ⭐️⭐️⭐️⭐️⭐️ 4.19

Description

Ethical Hacking: Hacking IoT Devices
Intermediate
2h 3m

Course description
The number of IoT (Internet of Things) devices deployed is increasing exponentially, which presents significant security challenges. In this course, Lisa Bock covers topics related to the IoT and OT hacking domain from the CEH body of knowledge. Lisa dives into the myriad of security challenges that the IoT faces, highlighting the importance of conducting ethical hacking to unearth vulnerabilities within IoT and operational technology (OT) devices. The course covers strategies for managing OT and industrial control systems (ICS). Furthermore, Lisa outlines methods for executing attacks on IoT/OT systems along with ways to safeguard systems against potential attacks, to ensure participants are well-equipped to protect these technologies. To help apply these concepts, Lisa provides a list of resources for best practice frameworks and guidance on securing IoT/OT systems. At the end of the course, you will have a robust arsenal to navigate the complex landscape of IoT security.

Introduction
Hacking IoT and OT systems
56s
Preview

Getting the most from this course
59s
Preview

Hacking ethically
55s
Preview

1. Understanding the IoT
Defining the IoT
3m 15s
Preview

Locked content
Gathering data
3m 44s

Locked content
Exchanging information
4m 24s

Locked content
Challenge: Enemybot
57s

Locked content
Solution: Enemybot
3m 21s

Chapter Quiz
3 questions

2. Recognizing IoT Security Issues
Outlining IoT threats
3m 57s
Preview

Locked content
Identifying OWASP IoT Top 10
4m 8s

Locked content
Reviewing IoT attacks
3m 50s

Locked content
Challenge: INDUSTROYER.V2
1m 26s

Locked content
Solution: INDUSTROYER.V2
4m 44s

Chapter Quiz
3 questions

3. Hacking the IoT
Describing IoT hacking
3m 32s
Preview

Locked content
Gathering Intel on IoT devices
5m 17s

Locked content
Evaluating IoT vulnerabilities
6m 43s

Locked content
Attacking IoT devices
5m 22s

Locked content
Gaining access to an IoT device
3m 41s

Chapter Quiz
5 questions

4. Controlling Systems with OT
Locked content
Describing OT
3m 38s

Locked content
Listing ICS components
4m 24s

Locked content
OT technologies and protocols
3m 9s

Locked content
Recognizing the challenges of OT
4m 30s

Locked content
Using MITRE ATT&CK for ICS
4m 22s

Chapter Quiz
7 questions

5. Exploiting OT Systems
Locked content
Pentesting OT systems
4m 53s

Locked content
Providing insights into OT attacks
3m 54s

Locked content
Seeking OT systems
4m 50s

Locked content
Searching for OT vulnerabilities
3m 21s

Locked content
Targeting OT systems
3m 53s

Chapter Quiz
5 questions

6. Defending against Attacks
Locked content
Countering IoT attacks
3m 48s

Locked content
Managing IoT devices
4m 48s

Locked content
Developing a secure device
2m 43s

Locked content
Implementing Zero Trust
4m 41s

Locked content
Designing a secure framework
3m 56s

Conclusion
Locked content
Next steps
1m 28s

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.