The Internet of Things (IoT) is the network of physical objects—devices, vehicles, buildings and other items— embedded with electronics, software, sensors, and network connectivity that enable these objects to collect and exchange data as defined in Wikipedia. In simple words, the devices connected to the internet irrespective of computational power, price, and size of the device
Experts anticipate the number of global M2M connections to surge further to 14.6 billion connections by 2022, growing at a pace of 19 per cent a year. With this explosion, however, comes a dark side, one unimaginably tempting to hackers. Little gadgets, however helpful to our daily lives they may be, already are – and will further be in the future – the villains’ weapon of choice.
The ubiquitousness of IoT devices – often dubbed as ‘internet of sh..t’, according to one cyber-security expert speaking off the record at InfoSecurity, the annual cyber-security conference held in London – means hackers could easily encounter an easy way into our systems and private lives, and perhaps even more worryingly, identify potential access to critical infrastructure systems that include everything from a nuclear power plant to water treatment plants. If fatal, it could risk lives, says one expert.
Critical infrastructure systems, water treatment or electricity plants, atomic power plants and anything that runs our daily lives, only started being regulated last year with the emergence of the European NIS Directive (Directive on security of network and information systems).
In this course, you’ll learn hacking IoT devices using Shodan, Censys, Nmap Scanner and Angry IP Scanner
Who this course is for:
- Security Analyst who’s assigned to secure their enterprise IoT devices.
- Security Researcher who want to discover vulnerable IoT devices such as IP Camera, ICS devices etc.