CEH v11: IoT Threats, Vulnerabilities, Attack Tools & Countermeasures
Ethical Hacker v11 | Intermediate
- 3 Videos | 1h 4m 58s
- Includes Assessment
- Earns a Badge
Internet-of-Things (IoT) devices make our lives convenient and that makes them more prevalent every day. In this course, you'll learn about IoT and its main components, as well as IoT architecture, deployment areas, protocols, communication models, and security challenges. The best way to effectively attack IoT devices is to be familiar with the common threats and vulnerabilities, so next you'll explore these areas. Finally, you'll examine common attacks and hacking tools that you can use to gain access to IoT devices, as well as defensive countermeasures you can employ to protect against those attacks and tools. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.
WHAT YOU WILL LEARN
describe IoT and recognize its main componentsidentify the IoT protocols used for deploymentdescribe the IoT architectural componentsrecognize the communication models used in IoTdescribe common IoT threatsidentify OWAP Top 10 IoT threats and vulnerabilities
recognize the attack surface for IoT devicesidentify tools used for attacking IoT devicesdescribe common IoT attacksidentify hacking tools and methods for hacking IoT devicesrecognize common attacks that can cause harm via IoT devices
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.