Ethical Hacking - Hacking IoT Devices [CEH v12] | LinkedIn Learning
- CategoryOther
- TypeTutorials
- LanguageEnglish
- Total size235.4 MB
- Uploaded ByGodonfox
- Downloads2
- Last checkedApr. 11th '24
- Date uploadedApr. 11th '24
- Seeders 0
- Leechers0
Ethical Hacking - Hacking IoT Devices [CEH v12] | LinkedIn Learning
Course details
The number of IoT (Internet of Things) devices deployed is increasing exponentially, which presents significant security challenges. In this course, Lisa Bock covers topics related to the IoT and OT hacking domain from the CEH body of knowledge. Lisa dives into the myriad of security challenges that the IoT faces, highlighting the importance of conducting ethical hacking to unearth vulnerabilities within IoT and operational technology (OT) devices. The course covers strategies for managing OT and industrial control systems (ICS). Furthermore, Lisa outlines methods for executing attacks on IoT/OT systems along with ways to safeguard systems against potential attacks, to ensure participants are well-equipped to protect these technologies. To help apply these concepts, Lisa provides a list of resources for best practice frameworks and guidance on securing IoT/OT systems. At the end of the course, you will have a robust arsenal to navigate the complex landscape of IoT security.
Regards!
Files:
LinkedIn Learning - Ethical Hacking Hacking IoT Devices [CEH v12] 04 - 3. Hacking the IoT- 03 - Evaluating IoT vulnerabilities.mp4 (16.7 MB)
- 01 - Describing IoT hacking.mp4 (5.8 MB)
- 01 - Describing IoT hacking.srt (4.8 KB)
- 02 - Gathering Intel on IoT devices.mp4 (10.3 MB)
- 02 - Gathering Intel on IoT devices.srt (7.3 KB)
- 03 - Evaluating IoT vulnerabilities.srt (9.1 KB)
- 04 - Attacking IoT devices.mp4 (9.1 MB)
- 04 - Attacking IoT devices.srt (7.2 KB)
- 05 - Gaining access to an IoT device.mp4 (6.4 MB)
- 05 - Gaining access to an IoT device.srt (5.0 KB)
- 01 - Hacking IoT and OT systems.mp4 (3.5 MB)
- 01 - Hacking IoT and OT systems.srt (1.3 KB)
- 02 - Getting the most from this course.mp4 (1.5 MB)
- 02 - Getting the most from this course.srt (1.5 KB)
- 03 - Hacking ethically.mp4 (1.4 MB)
- 03 - Hacking ethically.srt (1.3 KB)
- 01 - Defining the IoT.mp4 (5.8 MB)
- 01 - Defining the IoT.srt (4.2 KB)
- 02 - Gathering data.mp4 (6.9 MB)
- 02 - Gathering data.srt (5.8 KB)
- 03 - Exchanging information.mp4 (6.6 MB)
- 03 - Exchanging information.srt (5.3 KB)
- 04 - Challenge Enemybot.mp4 (1.7 MB)
- 04 - Challenge Enemybot.srt (1.3 KB)
- 05 - Solution Enemybot.mp4 (5.2 MB)
- 05 - Solution Enemybot.srt (4.3 KB)
- 01 - Outlining IoT threats.mp4 (6.6 MB)
- 01 - Outlining IoT threats.srt (5.6 KB)
- 02 - Identifying OWASP IoT Top 10.mp4 (9.8 MB)
- 02 - Identifying OWASP IoT Top 10.srt (5.4 KB)
- 03 - Reviewing IoT attacks.mp4 (6.6 MB)
- 03 - Reviewing IoT attacks.srt (5.3 KB)
- 04 - Challenge INDUSTROYER.V2.mp4 (2.2 MB)
- 04 - Challenge INDUSTROYER.V2.srt (1.9 KB)
- 05 - Solution INDUSTROYER.V2.mp4 (9.0 MB)
- 05 - Solution INDUSTROYER.V2.srt (6.3 KB)
- Readme.txt (1.2 KB) 05 - 4. Controlling Systems with OT
- 01 - Describing OT.mp4 (5.8 MB)
- 01 - Describing OT.srt (5.1 KB)
- 02 - Listing ICS components.mp4 (7.2 MB)
- 02 - Listing ICS components.srt (6.3 KB)
- 03 - OT technologies and protocols.mp4 (4.8 MB)
- 03 - OT technologies and protocols.srt (4.2 KB)
- 04 - Recognizing the challenges of OT.mp4 (7.9 MB)
- 04 - Recognizing the challenges of OT.srt (6.4 KB)
- 05 - Using MITRE ATT&CK for ICS.mp4 (10.7 MB)
- 05 - Using MITRE ATT&CK for ICS.srt (5.8 KB)
- 01 - Pentesting OT systems.mp4 (8.4 MB)
- 01 - Pentesting OT systems.srt (6.5 KB)
- 02 - Providing insights into OT attacks.mp4 (6.4 MB)
- 02 - Providing insights into OT attacks.srt (6.1 KB)
- 03 - Seeking OT systems.mp4 (9.6 MB)
- 03 - Seeking OT systems.srt (6.9 KB)
- 04 - Searching for OT vulnerabilities.mp4 (6.5 MB)
- 04 - Searching for OT vulnerabilities.srt (4.7 KB)
- 05 - Targeting OT systems.mp4 (6.9 MB)
- 05 - Targeting OT systems.srt (5.7 KB)
- 01 - Countering IoT attacks.mp4 (8.3 MB)
- 01 - Countering IoT attacks.srt (5.5 KB)
- 02 - Managing IoT devices.mp4 (8.1 MB)
- 02 - Managing IoT devices.srt (7.0 KB)
- 03 - Developing a secure device.mp4 (4.1 MB)
- 03 - Developing a secure device.srt (4.0 KB)
- 04 - Implementing Zero Trust.mp4 (10.6 MB)
- 04 - Implementing Zero Trust.srt (5.7 KB)
- 05 - Designing a secure framework.mp4 (12.2 MB)
- 05 - Designing a secure framework.srt (5.4 KB)
- 01 - Next steps.mp4 (2.2 MB)
- 01 - Next steps.srt (2.1 KB)
- EH-IoT and OT Challenges and Links.pdf (127.8 KB)
Code:
- udp://tracker.opentrackr.org:1337/announce
- https://tracker2.ctix.cn:443/announce
- https://tracker1.520.jp:443/announce
- udp://opentracker.i2p.rocks:6969/announce
- udp://open.tracker.cl:1337/announce
- udp://open.demonii.com:1337/announce
- udp://tracker.openbittorrent.com:6969/announce
- http://tracker.openbittorrent.com:80/announce
- udp://open.stealth.si:80/announce
- udp://exodus.desync.com:6969/announce
- udp://tracker.torrent.eu.org:451/announce
- udp://tracker1.bt.moack.co.kr:80/announce
- udp://tracker-udp.gbitt.info:80/announce
- https://tracker.gbitt.info:443/announce
- http://tracker.gbitt.info:80/announce