This course is meant for cyber security professionals who wish to learn how to identify vulnerabilities in IoT devices that they are authorised to test. This course also provides an overview of key risk mitigation measures to secure the IoT devices from cyber attacks.
In this course, the usage of the terms “hacking” or “vulnerability assessment” or “penetration testing” or “exploitation”, refers to the act of identifying vulnerabilities in a system, that one is authorised to test. The end objective being to secure the target system from cyber attacks.
video_library Rich Learning Content
assessment Quizzes & Projects
verified_user Taught by Industry Pros
timer Full Lifetime Access
forum Student Support Community
grade Certificate of Completion