Language: English
Created by: Hassan A
Rate: 4.5 / 19 ratings
Enroll: 5,893 students
What you’ll learn
- Learn about Basics of IoT devices, architecture and Common IoT vulnerabilities
- Utilize tools and techniques for firmware extraction.
- Analyze extracted firmware for vulnerabilities and functionalities.
- Emulating a firmware for dynamic analysis of IoT devices
- Learn to Backdoor a firmware
- Analyze vulnerabilities present in Modbus implementations.
- Learn Modbus fundamentals, its weaknesses and how to exploit it.
Requirements
- Basic Hands-on experience with Kali Linux is recommended
Description
Dive into the world of IoT security! This beginner-friendly course equips you with the foundational knowledge of vulnerabilities in connected devices. Learn how to identify threats, understand penetration testing methodologies, and gain hands-on experience through practical exercises. No prior experience is required on IoT devices – just a passion for protecting the interconnected future!
Section 1: Demystifying the Internet of Things (IoT)
- IoT Fundamentals 101:Â Grasp the core concepts – components, communication protocols, real-world applications.
- Unveiling the Architecture:Â Deep dive into the layers and data flow within IoT systems.
- Securing the Frontier:Â Master common IoT vulnerabilities and the consequences of security breaches.
Section 2: Cracking the Code: Firmware Analysis and Manipulation
- Firmware Extraction Mastery:Â Unlock the secrets within devices using industry-standard tools and techniques.
- Firmware Forensics:Â Analyze extracted firmware to identify vulnerabilities, functionalities, and valuable information.
- Emulation Engineering:Â Create safe simulated environments for testing attacks on IoT devices.
- Advanced Backdooring (Educational Only):Â Understand the concept of backdooring router and learn to backdoor a real-world WIFI router.
Section 3: Attacking IoT Protocols: MQTT and Modbus for Beginners
- MQTT for Beginners:Â Master the Message Queueing Telemetry Transport protocol and its potential security weaknesses.
- Modbus Mastery:Â Unlock the secrets of the Modbus protocol used in industrial control systems and identify vulnerabilities.
- Penetration Testing Prowess:Â Gain hands-on experience with industry-standard tools and techniques to ethically exploit vulnerabilities and test the security of IoT networks exploiting MQTT and Modbus protocols (Note:Â Techniques covered for educational purposes only.)
This comprehensive course equips you with the knowledge and skills to become a sought-after expert in securing the ever-expanding world of the Internet of Things.
#IoTSecurity #IoT #ethicalhacking
Who this course is for:
- Cyber Security Professionals interested in IoT and OT security and Hacking
- Penetration testers looking to improve their skill set
- Professionals seeking the comprehensive technical skills needed to understand, analyze, attack, and defend the entire spectrum of the IoT ecosystem.