TorBT - Torrents and Magnet Links Search Engine
LinkedIn Learning - Ethical Hacking Hacking IoT Devices [CEH v12]
- Date: 2024-04-25
- Size: 235 MB
- Files: 70
File Name
Size
04 - 3. Hacking the IoT/03 - Evaluating IoT vulnerabilities.mp4
17 MB
01 - Introduction/01 - Hacking IoT and OT systems.mp4
3.5 MB
01 - Introduction/01 - Hacking IoT and OT systems.srt
1.3 kB
01 - Introduction/02 - Getting the most from this course.mp4
1.5 MB
01 - Introduction/02 - Getting the most from this course.srt
1.5 kB
01 - Introduction/03 - Hacking ethically.mp4
1.4 MB
01 - Introduction/03 - Hacking ethically.srt
1.3 kB
02 - 1. Understanding the IoT/01 - Defining the IoT.mp4
5.8 MB
02 - 1. Understanding the IoT/01 - Defining the IoT.srt
4.2 kB
02 - 1. Understanding the IoT/02 - Gathering data.mp4
6.9 MB
02 - 1. Understanding the IoT/02 - Gathering data.srt
5.8 kB
02 - 1. Understanding the IoT/03 - Exchanging information.mp4
6.6 MB
02 - 1. Understanding the IoT/03 - Exchanging information.srt
5.3 kB
02 - 1. Understanding the IoT/04 - Challenge Enemybot.mp4
1.7 MB
02 - 1. Understanding the IoT/04 - Challenge Enemybot.srt
1.3 kB
02 - 1. Understanding the IoT/05 - Solution Enemybot.mp4
5.2 MB
02 - 1. Understanding the IoT/05 - Solution Enemybot.srt
4.3 kB
03 - 2. Recognizing IoT Security Issues/01 - Outlining IoT threats.mp4
6.6 MB
03 - 2. Recognizing IoT Security Issues/01 - Outlining IoT threats.srt
5.6 kB
03 - 2. Recognizing IoT Security Issues/02 - Identifying OWASP IoT Top 10.mp4
9.8 MB
03 - 2. Recognizing IoT Security Issues/02 - Identifying OWASP IoT Top 10.srt
5.4 kB
03 - 2. Recognizing IoT Security Issues/03 - Reviewing IoT attacks.mp4
6.6 MB
03 - 2. Recognizing IoT Security Issues/03 - Reviewing IoT attacks.srt
5.3 kB
03 - 2. Recognizing IoT Security Issues/04 - Challenge INDUSTROYER.V2.mp4
2.2 MB
03 - 2. Recognizing IoT Security Issues/04 - Challenge INDUSTROYER.V2.srt
1.9 kB
03 - 2. Recognizing IoT Security Issues/05 - Solution INDUSTROYER.V2.mp4
9.0 MB
03 - 2. Recognizing IoT Security Issues/05 - Solution INDUSTROYER.V2.srt
6.3 kB
04 - 3. Hacking the IoT/01 - Describing IoT hacking.mp4
5.8 MB
04 - 3. Hacking the IoT/01 - Describing IoT hacking.srt
4.8 kB
04 - 3. Hacking the IoT/02 - Gathering Intel on IoT devices.mp4
10 MB
04 - 3. Hacking the IoT/02 - Gathering Intel on IoT devices.srt
7.3 kB
Readme.txt
1.2 kB
04 - 3. Hacking the IoT/03 - Evaluating IoT vulnerabilities.srt
9.1 kB
04 - 3. Hacking the IoT/04 - Attacking IoT devices.mp4
9.1 MB
04 - 3. Hacking the IoT/04 - Attacking IoT devices.srt
7.2 kB
04 - 3. Hacking the IoT/05 - Gaining access to an IoT device.mp4
6.4 MB
04 - 3. Hacking the IoT/05 - Gaining access to an IoT device.srt
5.0 kB
05 - 4. Controlling Systems with OT/01 - Describing OT.mp4
5.8 MB
05 - 4. Controlling Systems with OT/01 - Describing OT.srt
5.1 kB
05 - 4. Controlling Systems with OT/02 - Listing ICS components.mp4
7.2 MB
05 - 4. Controlling Systems with OT/02 - Listing ICS components.srt
6.3 kB
05 - 4. Controlling Systems with OT/03 - OT technologies and protocols.mp4
4.8 MB
05 - 4. Controlling Systems with OT/03 - OT technologies and protocols.srt
4.2 kB
05 - 4. Controlling Systems with OT/04 - Recognizing the challenges of OT.mp4
7.9 MB
05 - 4. Controlling Systems with OT/04 - Recognizing the challenges of OT.srt
6.4 kB
05 - 4. Controlling Systems with OT/05 - Using MITRE ATT&CK for ICS.mp4
11 MB
05 - 4. Controlling Systems with OT/05 - Using MITRE ATT&CK for ICS.srt
5.8 kB
06 - 5. Exploiting OT Systems/01 - Pentesting OT systems.mp4
8.4 MB
06 - 5. Exploiting OT Systems/01 - Pentesting OT systems.srt
6.5 kB
06 - 5. Exploiting OT Systems/02 - Providing insights into OT attacks.mp4
6.4 MB
06 - 5. Exploiting OT Systems/02 - Providing insights into OT attacks.srt
6.1 kB
06 - 5. Exploiting OT Systems/03 - Seeking OT systems.mp4
9.6 MB
06 - 5. Exploiting OT Systems/03 - Seeking OT systems.srt
6.9 kB
06 - 5. Exploiting OT Systems/04 - Searching for OT vulnerabilities.mp4
6.5 MB
06 - 5. Exploiting OT Systems/04 - Searching for OT vulnerabilities.srt
4.7 kB
06 - 5. Exploiting OT Systems/05 - Targeting OT systems.mp4
6.9 MB
06 - 5. Exploiting OT Systems/05 - Targeting OT systems.srt
5.7 kB
07 - 6. Defending against Attacks/01 - Countering IoT attacks.mp4
8.3 MB
07 - 6. Defending against Attacks/01 - Countering IoT attacks.srt
5.5 kB
07 - 6. Defending against Attacks/02 - Managing IoT devices.mp4
8.1 MB
07 - 6. Defending against Attacks/02 - Managing IoT devices.srt
7.0 kB
07 - 6. Defending against Attacks/03 - Developing a secure device.mp4
4.1 MB
07 - 6. Defending against Attacks/03 - Developing a secure device.srt
4.0 kB
07 - 6. Defending against Attacks/04 - Implementing Zero Trust.mp4
11 MB
07 - 6. Defending against Attacks/04 - Implementing Zero Trust.srt
5.7 kB
07 - 6. Defending against Attacks/05 - Designing a secure framework.mp4
12 MB
07 - 6. Defending against Attacks/05 - Designing a secure framework.srt
5.4 kB
08 - Conclusion/01 - Next steps.mp4
2.2 MB
08 - Conclusion/01 - Next steps.srt
2.1 kB
Ex_Files_Ethical_Hacking_IoT_Devices/Exercise Files/EH-IoT and OT Challenges and Links.pdf
128 kB