Certified Ethical Hacker - CEHv10: IoT Attacks


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description
Discover the vulnerabilities and attacks that can lead to IoT systems being compromised, as you prepare for the 312-50: Certified Ethical Hacker v10 exam. Watch these videos and learn how to identify the top IoT vulnerability, describe the first action to secure a device, identify common IoT attack areas, describe the top three IoT threats, define the type of attack that involves your device in a botnet, list the steps of an IoT hacking methodology, and identify the tools used to perform IoT attacks.

Expected Duration (hours)
1.2

Lesson Objectives

Certified Ethical Hacker - CEHv10: IoT Attacks

  • describe the first action to secure a device
  • identify the top IoT vulnerability
  • define the type of attack that involves your device in a botnet
  • describe the top three IoT threats
  • identify common IoT attack areas
  • identify the tools to perform IoT attacks
  • list the steps in the IoT hacking methodology
  • Course Number:
    it_spceh10tv_35_04_enus

    Expertise Level
    Intermediate