CEH v12: IoT Threats, Vulnerabilities, Attack Tools, and Countermeasures
Ronald Ellis
Skillsoft issued completion badges are earned based on viewing the percentage required or receiving a passing score when assessment is required. Internet of Things (IoT) devices make our lives convenient and that makes them more prevalent every day.
In this course, you'll learn about IoT and its main components, as well as IoT architecture, deployment areas, protocols, communication models, and security challenges. The best way to effectively attack IoT devices is to be familiar with the common threats and vulnerabilities, so next you'll explore these areas. Finally, you'll examine common attacks and hacking tools that you can use to gain access to IoT devices, as well as defensive countermeasures you can employ to protect against those attacks and tools.
This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.
Issued on
March 26, 2025
Expires on
Does not expire