Companies Home Search Profile

Ethical Hacking: Hacking the Internet of Things (IoT)

Focused View

Dale Meredith

2:44:47

0 View
  • 1 -Course Overview.mp4
    02:35
  • 2 -Course Introduction.mp4
    07:26
  • 3 -How Does It All Work.mp4
    01:40
  • 4 -The Architecture of IoT.mp4
    02:44
  • 5 -IoT Is in More Places Than You Think.mp4
    07:54
  • 6 -Protocols and Technologies.mp4
    05:04
  • 7 -More Protocols and Technologies.mp4
    04:03
  • 8 -OSs for IoT.mp4
    04:05
  • 9 -The Challenges IoT Presents.mp4
    05:12
  • 10 -More Challenges for IoT.mp4
    03:29
  • 11 -What Youll Learn.mp4
    01:21
  • 12 -Vulnerabilities and Hurdles.mp4
    05:19
  • 13 -The Culprits.mp4
    02:00
  • 14 -OWASPs Top 10.mp4
    06:23
  • 15 -The Massive Attack Surface.mp4
    04:51
  • 16 -Did I Mention Its Massive.mp4
    07:22
  • 17 -Our Top 13 Threats.mp4
    06:12
  • 18 -A Case Study The Target Breach.mp4
    08:09
  • 19 -What You Learned.mp4
    01:12
  • 20 -What Youll Learn.mp4
    01:02
  • 21 -Lets Define IoT Hacking.mp4
    03:11
  • 22 -Phase 1 Reconnaissance.mp4
    02:09
  • 23 -Phase 2 Looking for Vulnerabilities.mp4
    01:16
  • 24 -Phase 3 Attacks.mp4
    01:48
  • 25 -Phase 4 Achieve Access.mp4
    02:17
  • 26 -Phase 5 Maintaining Access.mp4
    02:00
  • 27 -What We Learned.mp4
    01:30
  • 28 -What Youll Learn.mp4
    00:44
  • 29 -Reconnaissance.mp4
    00:40
  • 30 -Demo Shodan.mp4
    07:49
  • 31 -Demo AngryIP Scanner and Fing.mp4
    06:14
  • 32 -Demo Thingful.mp4
    03:02
  • 33 -Demo Suphacap.mp4
    04:19
  • 34 -The HackRF One.mp4
    01:24
  • 35 -Demo IoTSeeker.mp4
    02:56
  • 36 -Demo Looking for Vulnerabilities.mp4
    02:26
  • 37 -Demo Using Nmap to Search for Vulnerabilities.mp4
    06:42
  • 38 -Demo BitdefenderBox.mp4
    03:11
  • 39 -Attacks.mp4
    03:10
  • 40 -What You Learned.mp4
    00:34
  • 41 -What Youll Learn.mp4
    00:57
  • 42 -Some Basics.mp4
    04:20
  • 43 -What to Watch at Each Level.mp4
    03:40
  • 44 -Manufacture Guidelines.mp4
    02:32
  • 45 -Quick 10 From OWASP.mp4
    05:41
  • 46 -What You Learned.mp4
    02:12
  • Description


    The Internet of Things (IoT) is one of the most talked about trends in technology. There are a plethora of devices being released daily (some a need, some a joke). The real issue is each device opens a new attack vector that you never saw coming.

    What You'll Learn?


      At the core of Ethical Hacking, every Security Professional needs to have a thorough knowledge of all devices on their networks, including the Internet of Things (IoT).

      In this course, Ethical Hacking: Hacking the Internet of Things (IoT), you’ll see how these devices are designed to work and how to protect your infrastructure with these devices coming online. First, you'll learn about the different communication models IoT devices use, as well as the most common architectures and protocols. Next, you’ll be introduced to the different threats that IoT devices create if not managed correctly, you'll also learn about how to choose a manufacturer whose goals are also to protect your networks. Finally, you'll discover the different tools that could be used against you as well as some countermeasures you can deploy to better protect your resources. When you’re finished with this course, you’ll have a great understanding of IoT devices and how they could possibly open new attack vectors, as well as understanding that will help you as you move forward as a security professional in Ethical Hacking

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Dale Meredith
    Dale Meredith
    Instructor's Courses
    Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material. Straddling the line of fun and function, Dale's instruction is memorable and entertaining. Dale's knowledge and understanding of current trends in technology and applications have led to many opportunities, such as: training various Inc 500 companies, universities, and Divisions of the Department of Homeland Security for the United States government. Along with authoring for Pluralsight, consulting, and IT classroom training, you can catch Dale on stage speaking at IT conferences, helping IT teams keep their companies safe, relevant, and "breach" aware. Outside of the professional sphere, Dale spends quite a bit of his time giving back by speaking at adult and youth non-profit community gatherings and posting on his 'Dale Dumbs IT Down' social media sites. Dale uses these speaking engagements and social media sites to 'Dumb Down IT' concepts with the intent to help everyone be safe and smart with their technology and personal devices. Dale also specializes in Active Directory, Exchange Server, IIS, PowerShell, SharePoint, System Center/Desktop Deployment, and Private Cloud
    Pluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
    • language english
    • Training sessions 46
    • duration 2:44:47
    • level preliminary
    • Release Date 2025/01/16