Hands-On IoT Penetration Testing [Video]

More Information
Learn
  • Set up Lab Environment for IoT Pentesting. 
  • Establish a secure Network Architecture of Internet of things (IoT)
  • Secure your Pro-Cam by Pentesting it with Metasploit
  • Perform Gateway Penetration Testing on VyOS by hacking the gateway and its services
  • Implement Wireless Penetration Testing on your Google wireless device
  • Perform Endpoint Penetration Testing on Client Servers and Machines like Amazon echo, tp -link device and software firewalls like Comodo and private eye
  • Pentest your Android devices with Android Studio
  • Generate a successful report in the end with Magic Tree and Dradis
About

Pentesting is much like taking a battering ram to the door of a fortress. You keep pounding away but try to find a secret backdoor to enter through. But what happens if pieces of the network are outside the fortress? The solution to this problem is IOT pentesting.
This course begins with the IoT device architecture to help you understand the most common vulnerabilities. You'll explore networks, sniffing out vulnerabilities while also ensuring that the hardware devices and the software running on them are free of any security loopholes.
Moving on, you will learn how to perform pentesting on advanced IoT Devices including Amazon Eco, Logitech Cameras, the Google Nexus phone, Vyos Gateways, TP-Link Smart Switches, and firewalls. By the end of the course, you will be able to create IoT pentesting reports. After completion of the course, you will be able to penetrate even the most densely populated IoT networks.

Style and Approach

To satisfy market demands, this course is designed to enhance the skills of professionals working in IoT Pentesting. We realize the importance of the student's time and goals and emphasized on the practicality of the subject

Features
  • Quickly set up your pentesting environment and get equipped with major tools such as Metasploit, Android Studio, Hydra, Medusa, Dradis, Magictree, and more.
  • Perform IoT pentesting using software and hardware devices.
  • Generate and analyze IOT pentesting reports.
Course Length 2 hours 32 minutes
ISBN 9781789614923
Date Of Publication 28 Nov 2018

Authors

Sunil Gupta

Sunil Gupta is an experienced computer programmer and cybersecurity expert. Sunil Gupta consults in information technology with a focus on cybersecurity. He is an invited speaker for, and a member of, many key organizations.

Sunil has helped many organizations around the Globe including Barclays Bank, Aviation College Qatar (QATAR), Ethiopian Airlines, Telecom Authority Tanzania, NCB Bank (Saudi Arabia), Accenture (India), Afghan Wireless (Afghanistan), and many more.

Currently, he teaches online over 50,000 students in more than 170 countries and some of his best work has been published by major publishing houses. Some of his best courses include: End-to-End Penetration Testing with Kali Linux and Threat and Vulnerability Assessment for Enterprises.

His cybersecurity certifications include SSCP Certification (Systems Security Certified Practitioner), Bug Bounty Program Certification, and more.

https://www.linkedin.com/in/sunilguptaethicalhacker/