Module 21: IoT Security

Introduction: The implementation of IoT devices does not escape from the possibility of being compromised, on the contrary, its wide use has turned it into a potential target of attack by a hacker with malicious intentions, then let's talk about the vulnerabilities in this type of technology. Learning Objectives: By the end of this lesson [...]

Back to: Certified Ethical Hacker v10