From the course: Certified Ethical Hacker (CEH)

Unlock this course with a free trial

Join today to access over 24,700 courses taught by industry experts.

Learning objectives

Learning objectives

- Welcome to our lesson on Internet of Things and operational technology hacking. Many devices these days have some form of internet connection, either true ethernet via wifi, or some form of transport protocol running on proprietary and non-proprietary RF technologies. Given the purpose-built nature of these devices, security is often an afterthought, which can lead to some interesting avenues for exploitation. In this lesson, we'll be surveying the landscape of IoT connectivity technologies, tools available to analyze that connectivity, and methodologies for attacking IoT devices.

Contents