Ultimate Ethical Hacking: IoT Security Pro 2024
Focused View
2:44:47
1 -Course Overview.mp4
02:35
2 -Course Introduction.mp4
07:26
3 -How Does It All Work.mp4
01:40
4 -The Architecture of IoT.mp4
02:44
5 -IoT Is in More Places Than You Think.mp4
07:54
6 -Protocols and Technologies.mp4
05:04
7 -More Protocols and Technologies.mp4
04:03
8 -OSs for IoT.mp4
04:05
9 -The Challenges IoT Presents.mp4
05:12
10 -More Challenges for IoT.mp4
03:29
11 -What Youll Learn.mp4
01:21
12 -Vulnerabilities and Hurdles.mp4
05:19
13 -The Culprits.mp4
02:00
14 -OWASPs Top 10.mp4
06:23
15 -The Massive Attack Surface.mp4
04:51
16 -Did I Mention Its Massive.mp4
07:22
17 -Our Top 13 Threats.mp4
06:12
18 -A Case Study The Target Breach.mp4
08:09
19 -What You Learned.mp4
01:12
20 -What Youll Learn.mp4
01:02
21 -Lets Define IoT Hacking.mp4
03:11
22 -Phase 1 Reconnaissance.mp4
02:09
23 -Phase 2 Looking for Vulnerabilities.mp4
01:16
24 -Phase 3 Attacks.mp4
01:48
25 -Phase 4 Achieve Access.mp4
02:17
26 -Phase 5 Maintaining Access.mp4
02:00
27 -What We Learned.mp4
01:30
28 -What Youll Learn.mp4
00:44
29 -Reconnaissance.mp4
00:40
30 -Demo Shodan.mp4
07:49
31 -Demo AngryIP Scanner and Fing.mp4
06:14
32 -Demo Thingful.mp4
03:02
33 -Demo Suphacap.mp4
04:19
34 -The HackRF One.mp4
01:24
35 -Demo IoTSeeker.mp4
02:56
36 -Demo Looking for Vulnerabilities.mp4
02:26
37 -Demo Using Nmap to Search for Vulnerabilities.mp4
06:42
38 -Demo BitdefenderBox.mp4
03:11
39 -Attacks.mp4
03:10
40 -What You Learned.mp4
00:34
41 -What Youll Learn.mp4
00:57
42 -Some Basics.mp4
04:20
43 -What to Watch at Each Level.mp4
03:40
44 -Manufacture Guidelines.mp4
02:32
45 -Quick 10 From OWASP.mp4
05:41
46 -What You Learned.mp4
02:12
More details
Course Overview
This comprehensive course dives into Ethical Hacking for IoT devices, teaching you how to identify vulnerabilities, protect networks, and counter emerging threats in the rapidly expanding world of connected devices.
What You'll Learn
- IoT communication models, architectures, and protocols
- Threat assessment and vulnerability identification for IoT devices
- Practical hacking techniques and countermeasures for IoT security
Who This Is For
- Security professionals expanding their ethical hacking skills
- IT administrators managing IoT-enabled networks
- Cybersecurity students specializing in emerging technologies
Key Benefits
- Master cutting-edge IoT security challenges
- Learn from real-world case studies like the Target breach
- Gain hands-on experience with professional hacking tools
Curriculum Highlights
- IoT Concepts and Architectures
- IoT Threat Types and Vulnerabilities
- Methodology of IoT Hacking
Focused display
- language english
- Training sessions 46
- duration 2:44:47
- level preliminary
- Release Date 2025/06/07