Home Search Profile

Ultimate Ethical Hacking: IoT Security Pro 2024

Focused View

2:44:47

  • 1 -Course Overview.mp4
    02:35
  • 2 -Course Introduction.mp4
    07:26
  • 3 -How Does It All Work.mp4
    01:40
  • 4 -The Architecture of IoT.mp4
    02:44
  • 5 -IoT Is in More Places Than You Think.mp4
    07:54
  • 6 -Protocols and Technologies.mp4
    05:04
  • 7 -More Protocols and Technologies.mp4
    04:03
  • 8 -OSs for IoT.mp4
    04:05
  • 9 -The Challenges IoT Presents.mp4
    05:12
  • 10 -More Challenges for IoT.mp4
    03:29
  • 11 -What Youll Learn.mp4
    01:21
  • 12 -Vulnerabilities and Hurdles.mp4
    05:19
  • 13 -The Culprits.mp4
    02:00
  • 14 -OWASPs Top 10.mp4
    06:23
  • 15 -The Massive Attack Surface.mp4
    04:51
  • 16 -Did I Mention Its Massive.mp4
    07:22
  • 17 -Our Top 13 Threats.mp4
    06:12
  • 18 -A Case Study The Target Breach.mp4
    08:09
  • 19 -What You Learned.mp4
    01:12
  • 20 -What Youll Learn.mp4
    01:02
  • 21 -Lets Define IoT Hacking.mp4
    03:11
  • 22 -Phase 1 Reconnaissance.mp4
    02:09
  • 23 -Phase 2 Looking for Vulnerabilities.mp4
    01:16
  • 24 -Phase 3 Attacks.mp4
    01:48
  • 25 -Phase 4 Achieve Access.mp4
    02:17
  • 26 -Phase 5 Maintaining Access.mp4
    02:00
  • 27 -What We Learned.mp4
    01:30
  • 28 -What Youll Learn.mp4
    00:44
  • 29 -Reconnaissance.mp4
    00:40
  • 30 -Demo Shodan.mp4
    07:49
  • 31 -Demo AngryIP Scanner and Fing.mp4
    06:14
  • 32 -Demo Thingful.mp4
    03:02
  • 33 -Demo Suphacap.mp4
    04:19
  • 34 -The HackRF One.mp4
    01:24
  • 35 -Demo IoTSeeker.mp4
    02:56
  • 36 -Demo Looking for Vulnerabilities.mp4
    02:26
  • 37 -Demo Using Nmap to Search for Vulnerabilities.mp4
    06:42
  • 38 -Demo BitdefenderBox.mp4
    03:11
  • 39 -Attacks.mp4
    03:10
  • 40 -What You Learned.mp4
    00:34
  • 41 -What Youll Learn.mp4
    00:57
  • 42 -Some Basics.mp4
    04:20
  • 43 -What to Watch at Each Level.mp4
    03:40
  • 44 -Manufacture Guidelines.mp4
    02:32
  • 45 -Quick 10 From OWASP.mp4
    05:41
  • 46 -What You Learned.mp4
    02:12
  • More details


    Course Overview

    This comprehensive course dives into Ethical Hacking for IoT devices, teaching you how to identify vulnerabilities, protect networks, and counter emerging threats in the rapidly expanding world of connected devices.

    What You'll Learn

    • IoT communication models, architectures, and protocols
    • Threat assessment and vulnerability identification for IoT devices
    • Practical hacking techniques and countermeasures for IoT security

    Who This Is For

    • Security professionals expanding their ethical hacking skills
    • IT administrators managing IoT-enabled networks
    • Cybersecurity students specializing in emerging technologies

    Key Benefits

    • Master cutting-edge IoT security challenges
    • Learn from real-world case studies like the Target breach
    • Gain hands-on experience with professional hacking tools

    Curriculum Highlights

    1. IoT Concepts and Architectures
    2. IoT Threat Types and Vulnerabilities
    3. Methodology of IoT Hacking
    Focused display
    • language english
    • Training sessions 46
    • duration 2:44:47
    • level preliminary
    • Release Date 2025/06/07