Welcome to Mobilarian Forum - Official Symbianize forum.

Join us now to get access to all our features. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, and so, so much more. It's also quick and totally free, so what are you waiting for?

Udemy - Hacking IoT (Internet Of Things)

Alexhost
TOP 110

TOP

Alpha and Omega
Member
Access
Joined
Jan 21, 2021
Messages
217,469
Reaction score
17,121
Points
113
Age
37
Location
OneDDL
grants
₲171,529
3 years of service
d8684e5700179d93bcef4791e4f3a7cf.jpeg

MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + srt | Duration: 27 lectures (2h 2m) | Size: 689.6 MB
Vulnerability Assessment and Penetration Test of IoT devices

What you'll learn:
Vulnerability Assessment and Penetration Test of IoT devices
Securing IoT devices
IoT (Internet Of Things) Security
Requirements
Basic knowledge of Operating Systems: Windows, Linux
Description
IoT (Internet of Things) devices are starting to be massively present in various areas of private and working life. And on the other hand, there are now many episodes that have leapt to the news about attacks on IoT systems with damage and sometimes even very serious consequences. The course illustrates how to verify the security of IoT systems, highlighting the main risks to which they are exposed and the methodologies useful for carrying out VAPT of IoT devices.
The course is divided into sections. In the first introductory section, the main standards and guidelines that can be used for the security of IoT devices are illustrated, and an introduction is made to the main communication protocols used in the IoT field. It also provides a description of the typical architecture of an IoT system and its areas of application.
The next section deals with the methodologies that can be used to perform a VAPT for IoT systems. The VAPT of an IoT system contemplates the security verification of all the parts that make up a complete IoT system: hardware / firmware, wired and radio communication protocols, web and cloud services, mobile apps. The section also describes the main risks facing IoT devices.
Who this course is for
IT Security Specialists
PenTesters
IT Security Auditors
IT Security Managers
Homepage
Code:
Please, Log in or Register to view codes content!

Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
Links are Interchangeable - No Password - Single Extraction
 
Top Bottom