The Internet of Things (IoT) is one of the most talked about trends in technology. There are a plethora of devices being released daily (some a need, some a joke). The real issue is each device opens a new attack vector that you never saw coming.
At the core of Ethical Hacking, every Security Professional needs to have a thorough knowledge of all devices on their networks, including the Internet of Things (IoT).
In this course, Ethical Hacking: Hacking the Internet of Things (IoT), you’ll see how these devices are designed to work and how to protect your infrastructure with these devices coming online. First, you'll learn about the different communication models IoT devices use, as well as the most common architectures and protocols. Next, you’ll be introduced to the different threats that IoT devices create if not managed correctly, you'll also learn about how to choose a manufacturer whose goals are also to protect your networks. Finally, you'll discover the different tools that could be used against you as well as some countermeasures you can deploy to better protect your resources. When you’re finished with this course, you’ll have a great understanding of IoT devices and how they could possibly open new attack vectors, as well as understanding that will help you as you move forward as a security professional in Ethical Hacking
Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material.
Course Overview Hi everyone. My name is Dale Meredith, and I'd like to welcome you to this course, Hacking the Internet of Things or IoT, which is actually a part of the Ethical Hacking series here at Pluralsight. Now I've been a Microsoft trainer since 1998, as well as a cyber security trainer and consultant, and I've worked on several corporate 500 companies, as well as for the Department of Homeland Security on several projects. I'd love to tell you about them, but of course, then I'd have to kill you. Listen, the Internet of Things is increasingly becoming a part of our infrastructures. So much of the increase in IoT, and their communications, comes from computing devices, as well as embedded sensor systems that are used in a lot of the manufacturing machine to machine communications, as well as smart energy grids, home and building automation, wearable devices, even vehicle to vehicle communication. IoT products are often sold with outdated, as well as unpatched OS's and even applications. Also, customers often forget or they, quite frankly, don't know to change default passwords or if they do change them they use weak passwords. Protecting your resources from all these attack services is paramount for any security professional. In this course we're going to go through and make sure that you learned a couple things. We're going to focus in on the different devices that are involved in the IoT world. We'll also look at the four different communication modes that IoT devices use, as well as the massive attack surface they present. Don't worry, I won't leave you hanging. We'll also cover some of the countermeasures that you can use to secure your network. By the end of this course you're going to have a better understanding how IoT devices can be used without creating multiple attack surfaces. You'll have a better idea of how to choose the right IoT manufacturer for your solution. Because this course is a part of the Ethical Hacking series you should obviously have watched some of the previous courses within this series and be comfortable with network technologies. I hope you'll join me on this journey as we learn how to protect ourselves with Ethical Hacking: Hacking the Internet of Things course here at Pluralsight.