Module 21: IoT Security

Please sign up for the course before starting the lesson.

Introduction: The implementation of IoT devices does not escape from the possibility of being compromised, on the contrary, its extensive use has turned it into a potential target of attack by  hackers with malicious intentions. Let’s talk about the vulnerabilities in this type of technology. Learning Objectives: By the end of this lesson you should […]

Back to: Certified Ethical Hacker v10