Ethical Hacking: Hacking the Internet of Things (IoT)
The Internet of Things (IoT) is one of the most talked about trends in technology. There are a plethora of devices being released daily (some a need, some a joke). The real issue is each device opens a new attack vector that you never saw coming.
What you'll learn
At the core of Ethical Hacking, every Security Professional needs to have a thorough knowledge of all devices on their networks, including the Internet of Things (IoT).
In this course, Ethical Hacking: Hacking the Internet of Things (IoT), you’ll see how these devices are designed to work and how to protect your infrastructure with these devices coming online. First, you'll learn about the different communication models IoT devices use, as well as the most common architectures and protocols. Next, you’ll be introduced to the different threats that IoT devices create if not managed correctly, you'll also learn about how to choose a manufacturer whose goals are also to protect your networks. Finally, you'll discover the different tools that could be used against you as well as some countermeasures you can deploy to better protect your resources. When you’re finished with this course, you’ll have a great understanding of IoT devices and how they could possibly open new attack vectors, as well as understanding that will help you as you move forward as a security professional in Ethical Hacking
Table of contents
- What You'll Learn 1m
- Reconnaissance 1m
- Demo: Shodan 8m
- Demo: AngryIP Scanner and Fing 6m
- Demo: Thingful 3m
- Demo: Suphacap 4m
- The HackRF One 1m
- Demo: IoTSeeker 3m
- Demo: Looking for Vulnerabilities 2m
- Demo: Using Nmap to Search for Vulnerabilities 7m
- Demo: BitdefenderBox 3m
- Attacks 3m
- What You Learned 1m