Ethical Hacker: IoT Hacking & Countermeasures
Ethical Hacker 10 | Intermediate
- 1 Video | 35m 6s
- Includes Assessment
- Earns a Badge
Examine the IoT hacking methodology and explore countermeasures that can be used to secure IoT devices, as you prepare for the 312-50: Certified Ethical Hacker v10 exam. Watch this video and learn how to explain an IoT Hacking methodology, describe a common tool used to gather information, describe a tool for that scans for vulnerability, and recall a common countermeasure that secures IoT devices.
WHAT YOU WILL LEARN
describe a common countermeasure in securing IoT devicesdescribe a tool for vulnerability scanning
describe a common tool used for information gatheringdescribe the IoT Hacking methodology
IN THIS COURSE
1.IoT Hacking Methodology and Countermeasures35m 6s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.