Ethical Hacking
Hacking IoT Devices
The number of IoT (internet of things) devices being deployed is growing exponentially and securing those devices is a huge challenge. In this course, Luciano Ferrari discusses how IoT devices work, including the architectures and protocols used. He covers the main attack surfaces used by hackers and security professionals against IoT devices, how to assess IoT security threats and vulnerabilities, and how to properly secure the devices by following industry best practices and implementing countermeasures.
Contents:
- Introduction
- 1. Dissecting the Internet of Things
- 2. Understanding IoT Attacks
- 3. Countermeasure
- Conclusion
Get a Reminder
Rating | Not enough ratings |
---|---|
Length | 35m |
Starts | On Demand (Start anytime) |
Cost | $29/month (Access to entire library- free trial available) |
From | LinkedIn Learning |
Instructor | Luciano Ferrari |
Download Videos | Only via the LinkedIn Learning mobile app |
Language | English |
Subjects | IT & Networking |
Tags | Ethical Hacking Internet of Things (IoT) Application Security |
Get a Reminder
Similar Courses
Careers
An overview of related careers and their average salaries in the US. Bars indicate income percentile.
Research Associate.Medical Devices $56k
Experienced Mobile & IoT Developer $61k
Embedded and IoT Application Engineer $71k
IOT Mobile Application Engineer $78k
IOT Engineer/Architect $81k
QAE - Alexa IoT $93k
Mobile Devices Specialist $93k
Linux IoT Engineer $103k
IOT Connectivity Architect $110k
IoT Platform Architect $132k
Head of Business Analytics, Devices $185k
Product Manager - Mobile Devices $201k
Write a review
Your opinion matters. Tell us what you think.
Please login to leave a review
Rating | Not enough ratings |
---|---|
Length | 35m |
Starts | On Demand (Start anytime) |
Cost | $29/month (Access to entire library- free trial available) |
From | LinkedIn Learning |
Instructor | Luciano Ferrari |
Download Videos | Only via the LinkedIn Learning mobile app |
Language | English |
Subjects | IT & Networking |
Tags | Ethical Hacking Internet of Things (IoT) Application Security |
Similar Courses
Sorted by relevance
Like this course?
Here's what to do next:
- Save this course for later
- Get more details from the course provider
- Enroll in this course