Ethical Hacker: IoT Attacks
Ethical Hacker 10
| Intermediate
- 2 videos | 1h 10m 53s
- Includes Assessment
- Earns a Badge
Discover the vulnerabilities and attacks that can lead to IoT systems being compromised, as you prepare for the 312-50: Certified Ethical Hacker v10 exam. Watch these videos and learn how to identify the top IoT vulnerability, describe the first action to secure a device, identify common IoT attack areas, describe the top three IoT threats, define the type of attack that involves your device in a botnet, list the steps of an IoT hacking methodology, and identify the tools used to perform IoT attacks.
WHAT YOU WILL LEARN
-
Describe the first action to secure a deviceidentify the top iot vulnerabilityDefine the type of attack that involves your device in a botnetidentify the tools to perform iot attacks
-
describe the top three iot threatsidentify common iot attack areaslist the steps in the iot hacking methodology
IN THIS COURSE
-
24m
-
46m 54s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.