LinkedIn Learning - Ethical Hacking Hacking IoT Devices [CEH V12]

Torrent Details


LinkedIn Learning - Ethical Hacking Hacking IoT Devices [CEH v12]

NAME
LinkedIn Learning - Ethical Hacking Hacking IoT Devices [CEH v12].torrent
CATEGORY
Other
INFOHASH
792fe1c98970581c43647366c6df8c6ad7db0a48
SIZE
235 MB in 70 files
ADDED
Uploaded on 20-04-2024 by our crawler pet called "Spidey".
SWARM
9 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

Ethical Hacking - Hacking IoT Devices [CEH v12] | LinkedIn Learning



Course details

The number of IoT (Internet of Things) devices deployed is increasing exponentially, which presents significant security challenges. In this course, Lisa Bock covers topics related to the IoT and OT hacking domain from the CEH body of knowledge. Lisa dives into the myriad of security challenges that the IoT faces, highlighting the importance of conducting ethical hacking to unearth vulnerabilities within IoT and operational technology (OT) devices. The course covers strategies for managing OT and industrial control systems (ICS). Furthermore, Lisa outlines methods for executing attacks on IoT/OT systems along with ways to safeguard systems against potential attacks, to ensure participants are well-equipped to protect these technologies. To help apply these concepts, Lisa provides a list of resources for best practice frameworks and guidance on securing IoT/OT systems. At the end of the course, you will have a robust arsenal to navigate the complex landscape of IoT security.

Regards!

Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
01 - Introduction/01 - Hacking IoT and OT systems.mp43.5 MB
01 - Introduction/01 - Hacking IoT and OT systems.srt1.3 KB
01 - Introduction/02 - Getting the most from this course.mp41.5 MB
01 - Introduction/02 - Getting the most from this course.srt1.5 KB
01 - Introduction/03 - Hacking ethically.mp41.4 MB
01 - Introduction/03 - Hacking ethically.srt1.3 KB
02 - 1. Understanding the IoT/01 - Defining the IoT.mp45.8 MB
02 - 1. Understanding the IoT/01 - Defining the IoT.srt4.2 KB
02 - 1. Understanding the IoT/02 - Gathering data.mp46.9 MB
02 - 1. Understanding the IoT/02 - Gathering data.srt5.8 KB
02 - 1. Understanding the IoT/03 - Exchanging information.mp46.6 MB
02 - 1. Understanding the IoT/03 - Exchanging information.srt5.3 KB
02 - 1. Understanding the IoT/04 - Challenge Enemybot.mp41.7 MB
02 - 1. Understanding the IoT/04 - Challenge Enemybot.srt1.3 KB
02 - 1. Understanding the IoT/05 - Solution Enemybot.mp45.2 MB
02 - 1. Understanding the IoT/05 - Solution Enemybot.srt4.3 KB
03 - 2. Recognizing IoT Security Issues/01 - Outlining IoT threats.mp46.6 MB
03 - 2. Recognizing IoT Security Issues/01 - Outlining IoT threats.srt5.6 KB
03 - 2. Recognizing IoT Security Issues/02 - Identifying OWASP IoT Top 10.mp49.8 MB
03 - 2. Recognizing IoT Security Issues/02 - Identifying OWASP IoT Top 10.srt5.4 KB
03 - 2. Recognizing IoT Security Issues/03 - Reviewing IoT attacks.mp46.6 MB
03 - 2. Recognizing IoT Security Issues/03 - Reviewing IoT attacks.srt5.3 KB
03 - 2. Recognizing IoT Security Issues/04 - Challenge INDUSTROYER.V2.mp42.2 MB
03 - 2. Recognizing IoT Security Issues/04 - Challenge INDUSTROYER.V2.srt1.9 KB
03 - 2. Recognizing IoT Security Issues/05 - Solution INDUSTROYER.V2.mp49 MB
03 - 2. Recognizing IoT Security Issues/05 - Solution INDUSTROYER.V2.srt6.3 KB
04 - 3. Hacking the IoT/01 - Describing IoT hacking.mp45.8 MB
04 - 3. Hacking the IoT/01 - Describing IoT hacking.srt4.8 KB
04 - 3. Hacking the IoT/02 - Gathering Intel on IoT devices.mp410.3 MB
04 - 3. Hacking the IoT/02 - Gathering Intel on IoT devices.srt7.3 KB
04 - 3. Hacking the IoT/03 - Evaluating IoT vulnerabilities.mp416.7 MB
04 - 3. Hacking the IoT/03 - Evaluating IoT vulnerabilities.srt9.1 KB
04 - 3. Hacking the IoT/04 - Attacking IoT devices.mp49.1 MB
04 - 3. Hacking the IoT/04 - Attacking IoT devices.srt7.2 KB
04 - 3. Hacking the IoT/05 - Gaining access to an IoT device.mp46.4 MB
04 - 3. Hacking the IoT/05 - Gaining access to an IoT device.srt5 KB
05 - 4. Controlling Systems with OT/01 - Describing OT.mp45.8 MB
05 - 4. Controlling Systems with OT/01 - Describing OT.srt5.1 KB
05 - 4. Controlling Systems with OT/02 - Listing ICS components.mp47.2 MB
05 - 4. Controlling Systems with OT/02 - Listing ICS components.srt6.3 KB
05 - 4. Controlling Systems with OT/03 - OT technologies and protocols.mp44.8 MB
05 - 4. Controlling Systems with OT/03 - OT technologies and protocols.srt4.2 KB
05 - 4. Controlling Systems with OT/04 - Recognizing the challenges of OT.mp47.9 MB
05 - 4. Controlling Systems with OT/04 - Recognizing the challenges of OT.srt6.4 KB
05 - 4. Controlling Systems with OT/05 - Using MITRE ATT&CK for ICS.mp410.7 MB
05 - 4. Controlling Systems with OT/05 - Using MITRE ATT&CK for ICS.srt5.8 KB
06 - 5. Exploiting OT Systems/01 - Pentesting OT systems.mp48.4 MB
06 - 5. Exploiting OT Systems/01 - Pentesting OT systems.srt6.5 KB
06 - 5. Exploiting OT Systems/02 - Providing insights into OT attacks.mp46.4 MB
06 - 5. Exploiting OT Systems/02 - Providing insights into OT attacks.srt6.1 KB
06 - 5. Exploiting OT Systems/03 - Seeking OT systems.mp49.6 MB
06 - 5. Exploiting OT Systems/03 - Seeking OT systems.srt6.9 KB
06 - 5. Exploiting OT Systems/04 - Searching for OT vulnerabilities.mp46.5 MB
06 - 5. Exploiting OT Systems/04 - Searching for OT vulnerabilities.srt4.7 KB
06 - 5. Exploiting OT Systems/05 - Targeting OT systems.mp46.9 MB
06 - 5. Exploiting OT Systems/05 - Targeting OT systems.srt5.7 KB
07 - 6. Defending against Attacks/01 - Countering IoT attacks.mp48.3 MB
07 - 6. Defending against Attacks/01 - Countering IoT attacks.srt5.5 KB
07 - 6. Defending against Attacks/02 - Managing IoT devices.mp48.1 MB
07 - 6. Defending against Attacks/02 - Managing IoT devices.srt7 KB
07 - 6. Defending against Attacks/03 - Developing a secure device.mp44.1 MB
07 - 6. Defending against Attacks/03 - Developing a secure device.srt4 KB
07 - 6. Defending against Attacks/04 - Implementing Zero Trust.mp410.6 MB
07 - 6. Defending against Attacks/04 - Implementing Zero Trust.srt5.7 KB
07 - 6. Defending against Attacks/05 - Designing a secure framework.mp412.2 MB
07 - 6. Defending against Attacks/05 - Designing a secure framework.srt5.4 KB
08 - Conclusion/01 - Next steps.mp42.2 MB
08 - Conclusion/01 - Next steps.srt2.1 KB
Ex_Files_Ethical_Hacking_IoT_Devices/Exercise Files/EH-IoT and OT Challenges and Links.pdf127.8 KB
Readme.txt1.2 KB

Alternative Torrents for 'LinkedIn Learning Ethical Hacking Hacking IoT Devices CEH v'.

There are no alternative torrents found.