Book

IoT Penetration Testing Cookbook

IoT is an upcoming trend in the IT industry today; there are a lot of IoT devices on the market but there is a minimal understanding of how to safeguard them. If you are a security enthusiast or pentester, this book will help you understand how to exploit and secure IoT devices. You will learn how to identify vulnerabilities in IoT device architecture and firmware using software and hardware pentesting techniques, and you'll also focus on various IoT exploitation techniques and security automation.

Offered byPackt Logo

Difficulty Level
Intermediate
Completion Time
15h4m approx.
Language
English
Certification
Not available

About Course

Book Content

chapters 15h4m total length

1. IoT Penetration Testing
2. IoT Threat Modeling
3. Firmware Analysis and exploitation
4. Exploitation of Embedded Web Applications
5. Exploitation of IoT Mobile applications
6. IoT Device Hacking
7. RF Analysis and Testing
8. Firmware Security Best Practices
9. Mobile Security Best Practices
10. Securing Hardware
11. Advanced IoT exploitation and Security Automation

On this page

Ready to Train Your Team?

Need training for your whole team? Get bulk pricing, LMS integration, and dedicated support.

Trusted by Leading Organizations Worldwide

Join thousands of companies that trust Calibr to power their learning and development initiatives.

Chalet Hotels logo
Pernod Ricard logo
ProMobi logo
Metrique logo
K Raheja Corp logo
Spyne.AI logo
VuNet Systems logo
Procurement Partners logo
vEngage.AI logo
1218 Global logo
TRADEJINI logo
Oben Electric logo
IIT STartups logo
EdTech Digit logo
MindSkillz logo
NewportMed logo

Request Access For Your Organization

Start training your team in minutes!

No credit card required

Related Resources