CEH v12: IoT Threats, Vulnerabilities, Attack Tools, and Countermeasures

CEH v12    |    Intermediate
  • 3 videos | 1h 43s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Internet of Things (IoT) devices make our lives convenient and that makes them more prevalent every day. In this course, you'll learn about IoT and its main components, as well as IoT architecture, deployment areas, protocols, communication models, and security challenges. The best way to effectively attack IoT devices is to be familiar with the common threats and vulnerabilities, so next you'll explore these areas. Finally, you'll examine common attacks and hacking tools that you can use to gain access to IoT devices, as well as defensive countermeasures you can employ to protect against those attacks and tools. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.

WHAT YOU WILL LEARN

  • Describe iot and recognize its main components
    identify the iot protocols used for deployment
    describe the iot architectural components
    recognize the communication models used in iot
    Identify owap top 10 iot threats and vulnerabilities
    recognize the attack surface for iot devices
  • describe common iot threats
    Recognize common attacks that can cause harm via iot devices
    identify hacking tools and methods for hacking iot devices
    describe common iot attacks
    identify tools used for attacking iot devices

IN THIS COURSE

  • Locked
    1.  Internet of Things (IoT) Concepts
    19m 46s
    Upon completion of this video, you will be able to outline the use of Internet of Things (IoT) and recognize its main components, architecture, deployment areas, protocols, communication models, and security challenges. FREE ACCESS
  • Locked
    2.  IoT Threats and Vulnerabilities
    15m 46s
    After completing this video, you will be able to recognize common IoT threats and vulnerabilities. FREE ACCESS
  • Locked
    3.  IoT Attacks Tools and Countermeasures
    25m 12s
    Upon completion of this video, you will be able to recognize common attacks and hacking tools that you can use to gain access to IoT devices, as well as defensive countermeasures you can employ to protect against those attacks and tools. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.8 of 26 users Rating 4.8 of 26 users (26)