Find out how to make IoT devices more secure by learning about the technologies and protocols used and how to implement countermeasures to address vulnerabilities.
Overview
Syllabus
Introduction
- Understand the hacking of IoT devices
- What you should know
- How the Internet of Things works
- IoT technologies and protocols
- IoT communication models
- Challenges of IoT
- OWASP top ten vulnerabilities
- IoT attack areas
- IoT attacks
- IoT hacking methodology
- IoT hacking demonstration, part 1
- IoT hacking demonstration, part 2
- Securing IoT devices
- Next steps
Taught by
Luciano Ferrari