Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

Ethical Hacking: Hacking IoT Devices

via LinkedIn Learning

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore IoT security challenges, learn ethical hacking for IoT/OT devices, and outline strategies to manage & defend against ICS attacks, followed by best practice guidelines.

Syllabus

Introduction
  • Hacking IoT and OT systems
  • Getting the most from this course
  • Hacking ethically
1. Understanding the IoT
  • Defining the IoT
  • Gathering data
  • Exchanging information
  • Challenge: Enemybot
  • Solution: Enemybot
2. Recognizing IoT Security Issues
  • Outlining IoT threats
  • Identifying OWASP IoT Top 10
  • Reviewing IoT attacks
  • Challenge: INDUSTROYER.V2
  • Solution: INDUSTROYER.V2
3. Hacking the IoT
  • Describing IoT hacking
  • Gathering Intel on IoT devices
  • Evaluating IoT vulnerabilities
  • Attacking IoT devices
  • Gaining access to an IoT device
4. Controlling Systems with OT
  • Describing OT
  • Listing ICS components
  • OT technologies and protocols
  • Recognizing the challenges of OT
  • Using MITRE ATT&CK for ICS
5. Exploiting OT Systems
  • Pentesting OT systems
  • Providing insights into OT attacks
  • Seeking OT systems
  • Searching for OT vulnerabilities
  • Targeting OT systems
6. Defending against Attacks
  • Countering IoT attacks
  • Managing IoT devices
  • Developing a secure device
  • Implementing Zero Trust
  • Designing a secure framework
Conclusion
  • Next steps

Taught by

Luciano Ferrari

Reviews

4.7 rating at LinkedIn Learning based on 11 ratings

Start your review of Ethical Hacking: Hacking IoT Devices

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.