5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Professional Certifications     EC Council     Certified Ethical hacker     Certified Ethical Hacker (CEH) v11

Internet-of-Things (IoT) devices make our lives convenient and that makes them more prevalent every day. In this course, you'll learn about IoT and its main components, as well as IoT architecture, deployment areas, protocols, communication models, and security challenges. The best way to effectively attack IoT devices is to be familiar with the common threats and vulnerabilities, so next you'll explore these areas. Finally, you'll examine common attacks and hacking tools that you can use to gain access to IoT devices, as well as defensive countermeasures you can employ to protect against those attacks and tools. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.



Objectives

CEHv11: IoT Threats, Vulnerabilities, Attack Tools & Countermeasures

  • describe IoT and recognize its main components
  • describe the IoT architectural components
  • identify the IoT protocols used for deployment
  • recognize the communication models used in IoT
  • describe common IoT threats
  • identify OWAP Top 10 IoT threats and vulnerabilities
  • recognize the attack surface for IoT devices
  • describe common IoT attacks
  • identify hacking tools and methods for hacking IoT devices
  • identify tools used for attacking IoT devices
  • recognize common attacks that can cause harm via IoT devices