CEH v11: IoT Threats Vulnerabilities Attack Tools & Countermeasures
Internet-of-Things (IoT) devices make our lives convenient and that makes them more prevalent every day. In this course youll learn about IoT and its main components as well as IoT architecture deployment areas protocols communication models and security challenges. The best way to effectively attack IoT devices is to be familiar with the common threats and vulnerabilities so next youll explore these areas. Finally youll examine common attacks and hacking tools that you can use to gain access to IoT devices as well as defensive countermeasures you can employ to protect against those attacks and tools. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.