Hacking IoT (Internet Of Things)

seeders: 7
leechers: 3
updated:

Download Fast Safe Anonymous
movies, software, shows...
  • Downloads: 172
  • Language: English

Files

[ FreeCourseWeb.com ] Hacking IoT (Internet Of Things)
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 01 Introduction to IoT Security
    • 001 IoT Security Standards and Guidelines.en.srt (6.2 KB)
    • 001 IoT Security Standards and Guidelines.mp4 (60.4 MB)
    • 002 Architecture of an IoT system.en.srt (2.8 KB)
    • 002 Architecture of an IoT system.mp4 (15.2 MB)
    • 003 IoT Communication Protocols.en.srt (11.0 KB)
    • 003 IoT Communication Protocols.mp4 (43.8 MB)
    02 VAPT methodology for IoT
    • 001 Typical attacks to IoT.en.srt (4.7 KB)
    • 001 Typical attacks to IoT.mp4 (32.9 MB)
    • 002 IoT Vulnerability Assessment and PenTest phases.en.srt (3.2 KB)
    • 002 IoT Vulnerability Assessment and PenTest phases.mp4 (20.4 MB)
    • 003 Risk analysis.en.srt (3.7 KB)
    • 003 Risk analysis.mp4 (25.9 MB)
    • 004 Threat modeling.en.srt (5.7 KB)
    • 004 Threat modeling.mp4 (48.2 MB)
    03 Hardware exploitation of IoT devices
    • 001 UART exploitation.en.srt (7.4 KB)
    • 001 UART exploitation.mp4 (45.7 MB)
    • 002 I2C exploitation.en.srt (6.3 KB)
    • 002 I2C exploitation.mp4 (42.5 MB)
    04 Cloud_Web exploitation of IoT infrastructure
    • 001 OWASP Web Security Testing Guide.en.srt (1.5 KB)
    • 001 OWASP Web Security Testing Guide.mp4 (16.3 MB)
    • 002 Help tools for Web Application VAPT.en.srt (6.4 KB)
    • 002 Help tools for Web Application VAPT.mp4 (48.1 MB)
    • 003 Input validation.en.srt (2.1 KB)
    • 003 Input validation.mp4 (21.1 MB)
    • 004 XSS attack.en.srt (3.3 KB)
    • 004 XSS attack.mp4 (31.7 MB)
    • 005 XSS attack Lab.en.srt (3.4 KB)
    • 005 XSS attack Lab.mp4 (28.4 MB)
    • 006 SQL Injection attack.en.srt (3.2 KB)
    • 006 SQL Injection attack.mp4 (30.9 MB)
    • 007 SQL Injection attack Lab.en.srt (3.5 KB)
    • 007 SQL Injection attack Lab.mp4 (27.0 MB)
    • 008 OS command Inject attack.en.srt (2.1 KB)
    • 008 OS command Inject attack.mp4 (20.4 MB)
    • 009 OS command Inject attack Lab.en.srt (3.8 KB)
    • 009 OS command Inject attack Lab.mp4 (34.9 MB)
    • 010 Unvalidated File Upload attack.en.srt (1.0 KB)
    • 010 Unvalidated File Upload attack.mp4 (11.3 MB)
    • 011 Unvalidated File Upload attack Lab.en.srt (4.0 KB)
    • 011 Unvalidated File Upload attack Lab.mp4 (40.7 MB)
    • 012 Local and Remote File Inclusion attacks.en.srt (2.0 KB)
    • 012 Local and Remote File Inclusion attacks.mp4 (17.6 MB)
    • 013 Local and Remote File Inclusion attacks Lab.en.srt (3.6 KB)
    • 013 Local and Remote File Inclusion attacks Lab.mp4 (25.4 MB)
    • 014 Insecure Deserialization attack.en.srt (2.0 KB)
    • 014 Insecure Deserialization attack.mp4 (16.1 MB)
    • 015 XXE (XML External Entities) attack.en.srt (2.0 KB)
    • 015 XXE (XML External Entities) attack.mp4 (21.3 MB)
    • 016 XXE (XML External Entities) Attack Lab.en.srt (4.1 KB)
    • 016 XXE (XML External Entities) Attack Lab.mp4 (36.0 MB)
    • Bonus Resources.txt (0.3 KB)

Description

Hacking IoT (Internet Of Things)

MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + srt | Duration: 27 lectures (2h 2m) | Size: 689.6 MB
Vulnerability Assessment and Penetration Test of IoT devices
What you'll learn:
Vulnerability Assessment and Penetration Test of IoT devices
Securing IoT devices
IoT (Internet Of Things) Security

Requirements
Basic knowledge of Operating Systems: Windows, Linux

Description
IoT (Internet of Things) devices are starting to be massively present in various areas of private and working life. And on the other hand, there are now many episodes that have leapt to the news about attacks on IoT systems with damage and sometimes even very serious consequences. The course illustrates how to verify the security of IoT systems, highlighting the main risks to which they are exposed and the methodologies useful for carrying out VAPT of IoT devices.

The course is divided into sections. In the first introductory section, the main standards and guidelines that can be used for the security of IoT devices are illustrated, and an introduction is made to the main communication protocols used in the IoT field. It also provides a description of the typical architecture of an IoT system and its areas of application.

,



Download torrent
762.4 MB
seeders:7
leechers:3
Hacking IoT (Internet Of Things)


Trackers

tracker name
udp://tracker.torrent.eu.org:451/announce
udp://tracker.tiny-vps.com:6969/announce
http://tracker.foreverpirates.co:80/announce
udp://tracker.cyberia.is:6969/announce
udp://exodus.desync.com:6969/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2780/announce
udp://tracker.internetwarriors.net:1337/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://open.stealth.si:80/announce
udp://9.rarbg.to:2900/announce
udp://9.rarbg.me:2720/announce
udp://opentor.org:2710/announce
µTorrent compatible trackers list

Download torrent
762.4 MB
seeders:7
leechers:3
Hacking IoT (Internet Of Things)


Torrent hash: 93686760181CBA6808A9758B19BCC9A247435F1D