HOME > IT & Software > Internet Of Things Security- VAPT of IoT devices

Internet Of Things Security- VAPT of IoT devices

SynopsisInternet Of Things Security: VAPT of IoT devices, available a...
Internet Of Things Security- VAPT of IoT devices  No.1

Internet Of Things Security: VAPT of IoT devices, available at $34.99, has an average rating of 3.3, with 32 lectures, based on 39 reviews, and has 214 subscribers.

You will learn about Vulnerability Assessment and Penetration Test of IoT devices Securing IoT devices IoT (Internet Of Things) Security IoT Hacking Iot devices Hardware exploitation IoT devices radio protocols exploitation Ethical Hacking This course is ideal for individuals who are IT Security Specialists or PenTesters or IT Security Auditors or IT Security Managers It is particularly useful for IT Security Specialists or PenTesters or IT Security Auditors or IT Security Managers.

Enroll now: Internet Of Things Security: VAPT of IoT devices

Summary

Title: Internet Of Things Security: VAPT of IoT devices

Price: $34.99

Average Rating: 3.3

Number of Lectures: 32

Number of Published Lectures: 32

Number of Curriculum Items: 32

Number of Published Curriculum Objects: 32

Original Price: 44.99

Quality Status: approved

Status: Live

What You Will Learn

  • Vulnerability Assessment and Penetration Test of IoT devices
  • Securing IoT devices
  • IoT (Internet Of Things) Security
  • IoT Hacking
  • Iot devices Hardware exploitation
  • IoT devices radio protocols exploitation
  • Ethical Hacking
  • Who Should Attend

  • IT Security Specialists
  • PenTesters
  • IT Security Auditors
  • IT Security Managers
  • Target Audiences

  • IT Security Specialists
  • PenTesters
  • IT Security Auditors
  • IT Security Managers
  • IoT (Internet of Things) devices are starting to be massively present in various areas of private and working life. And on the other hand, there are now many episodes that have leapt to the news about attacks on IoT systems with damage and sometimes even very serious consequences. The course illustrates how to verify the security of IoT systems, highlighting the main risks to which they are exposed and the methodologies useful for carrying out VAPT of IoT devices.

    The course is divided into sections. In the first introductory section, the main standards and guidelines that can be used for the security of IoT devices are illustrated, and an introduction is made to the main communication protocols used in the IoT field. It also provides a description of the typical architecture of an IoT system and its areas of application.

    The next section deals with the methodologies that can be used to perform a Vulnerability Assessment and Penetration Test for IoT systems. The VAPT of an IoT system contemplates the security verification of all the parts that make up a complete IoT system: hardware / firmware, wired and radio communication protocols, web and cloud services, mobile apps. The section also describes the main risks facing IoT devices.

    Course Curriculum

    Chapter 1: Introduction to IoT Security

    Lecture 1: IoT Security Standards and Guidelines

    Lecture 2: Architecture of an IoT system

    Lecture 3: IoT Communication Protocols

    Chapter 2: VAPT methodology for IoT

    Lecture 1: Typical attacks to IoT

    Lecture 2: IoT Vulnerability Assessment and PenTest phases

    Lecture 3: Risk analysis

    Lecture 4: Threat modeling

    Chapter 3: Hardware exploitation of IoT devices

    Lecture 1: UART exploitation

    Lecture 2: I2C exploitation

    Lecture 3: SPI exploitation

    Lecture 4: JTAG exploitation

    Lecture 5: Firmware extraction and analysis

    Chapter 4: Radio protocols exploitation of IoT devices

    Lecture 1: Frequency ranges used by IoT radio protocols and SDR tools

    Lecture 2: Replay attacks and countermeasures

    Lecture 3: Bluetooth Low Energy (BLE) exploitation

    Lecture 4: ZigBee exploitation

    Chapter 5: Cloud/Web exploitation of IoT infrastructure

    Lecture 1: OWASP Web Security Testing Guide

    Lecture 2: Help tools for Web Application VAPT

    Lecture 3: Input validation

    Lecture 4: XSS attack

    Lecture 5: XSS attack Lab

    Lecture 6: SQL Injection attack

    Lecture 7: SQL Injection attack Lab

    Lecture 8: OS command Inject attack

    Lecture 9: OS command Inject attack Lab

    Lecture 10: Unvalidated File Upload attack

    Lecture 11: Unvalidated File Upload attack Lab

    Lecture 12: Local and Remote File Inclusion attacks

    Lecture 13: Local and Remote File Inclusion attacks Lab

    Lecture 14: Insecure Deserialization attack

    Lecture 15: XXE (XML External Entities) attack

    Lecture 16: XXE (XML External Entities) Attack Lab

    Instructors

  • Internet Of Things Security- VAPT of IoT devices  No.2
    G.L. Golinelli
    Engineer
  • Rating Distribution

  • 1 stars: 3 votes
  • 2 stars: 4 votes
  • 3 stars: 12 votes
  • 4 stars: 6 votes
  • 5 stars: 14 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!