IoT Penetration Testing Cookbook
IoT is an upcoming trend in the IT industry today; there are a lot of IoT devices on the market but there is a minimal understanding of how to safeguard them. If you are a security enthusiast or pentester, this book will help you understand how to exploit and secure IoT devices. You will learn how to identify vulnerabilities in IoT device architecture and firmware using software and hardware pentesting techniques, and you'll also focus on various IoT exploitation techniques and security automation.
Offered by
Difficulty Level
Intermediate
Completion Time
15h4m
Language
English
About Book
Who Is This Book For?
This book targets IoT developers, IoT enthusiasts, pentesters, and security professionals who are interested in learning about IoT security. Prior knowledge of basic pentesting would be beneficial.
IoT Penetration Testing Cookbook
- About Book
- Who Is This Book For?
- Book Content
Book content
chapters • 15h4m total length
IoT Penetration Testing
IoT Threat Modeling
Firmware Analysis and exploitation
Exploitation of Embedded Web Applications
Exploitation of IoT Mobile applications
IoT Device Hacking
RF Analysis and Testing
Firmware Security Best Practices
Mobile Security Best Practices
Securing Hardware
Advanced IoT exploitation and Security Automation
Related Resources
Access Ready-to-Use Books for Free!
Get instant access to a library of pre-built books—free trial, no credit card required. Start training your team in minutes!