وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Ethical Hacking: Hacking IoT Devices

سرفصل های دوره

The number of IoT (Internet of Things) devices deployed is increasing exponentially, which presents significant security challenges. In this course, Lisa Bock covers topics related to the IoT and OT hacking domain from the CEH body of knowledge. Lisa dives into the myriad of security challenges that the IoT faces, highlighting the importance of conducting ethical hacking to unearth vulnerabilities within IoT and operational technology (OT) devices. The course covers strategies for managing OT and industrial control systems (ICS). Furthermore, Lisa outlines methods for executing attacks on IoT/OT systems along with ways to safeguard systems against potential attacks, to ensure participants are well-equipped to protect these technologies. To help apply these concepts, Lisa provides a list of resources for best practice frameworks and guidance on securing IoT/OT systems. At the end of the course, you will have a robust arsenal to navigate the complex landscape of IoT security.


01 - Introduction
  • 01 - Hacking IoT and OT systems
  • 02 - Getting the most from this course
  • 03 - Hacking ethically

  • 02 - 1. Understanding the IoT
  • 01 - Defining the IoT
  • 02 - Gathering data
  • 03 - Exchanging information
  • 04 - Challenge Enemybot
  • 05 - Solution Enemybot

  • 03 - 2. Recognizing IoT Security Issues
  • 01 - Outlining IoT threats
  • 02 - Identifying OWASP IoT Top 10
  • 03 - Reviewing IoT attacks
  • 04 - Challenge INDUSTROYER.V2
  • 05 - Solution INDUSTROYER.V2

  • 04 - 3. Hacking the IoT
  • 01 - Describing IoT hacking
  • 02 - Gathering Intel on IoT devices
  • 03 - Evaluating IoT vulnerabilities
  • 04 - Attacking IoT devices
  • 05 - Gaining access to an IoT device

  • 05 - 4. Controlling Systems with OT
  • 01 - Describing OT
  • 02 - Listing ICS components
  • 03 - OT technologies and protocols
  • 04 - Recognizing the challenges of OT
  • 05 - Using MITRE ATT&CK for ICS

  • 06 - 5. Exploiting OT Systems
  • 01 - Pentesting OT systems
  • 02 - Providing insights into OT attacks
  • 03 - Seeking OT systems
  • 04 - Searching for OT vulnerabilities
  • 05 - Targeting OT systems

  • 07 - 6. Defending against Attacks
  • 01 - Countering IoT attacks
  • 02 - Managing IoT devices
  • 03 - Developing a secure device
  • 04 - Implementing Zero Trust
  • 05 - Designing a secure framework

  • 08 - Conclusion
  • 01 - Next steps
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 38678
    حجم: 236 مگابایت
    مدت زمان: 124 دقیقه
    تاریخ انتشار: 10 مرداد 1403
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید