Hacking IoT and OT Systems - Ethical Hacking
Introduction
- Instructor: Lisa Bock, a security ambassador.
- Focus: Securing and managing IoT and Operational Technology (OT) devices to defend against cyber threats.
- Importance: IoT devices are interconnected (e.g., automobiles, watches, building automation) and require robust security to prevent physical damages and cyber threats.
Course Overview
1. Understanding the IoT
- Defining IoT: Explanation of IoT devices and their role in daily interactions and operations.
- Data Gathering and Exchange: How data is collected and exchanged in IoT systems.
- Challenges: Identifying challenges like Enemybot and solutions to tackle them.
2. Recognizing IoT Security Issues
- IoT Threats: Overview of potential risks and threats to IoT devices.
- OWASP IoT Top 10: Introduction to top security concerns for IoT.
- IoT Attacks: Understanding various IoT attacks and ways to counter them.
- Case Study: INDUSTROYER.V2 challenge and solution.
3. Hacking the IoT
- IoT Hacking: Methods and techniques used in hacking IoT devices.
- Intel Gathering: How to gather intelligence on IoT devices.
- Vulnerability Evaluation: Assessing vulnerabilities in IoT environments.
- Attack Techniques: Approaches for attacking and gaining access to IoT devices.
4. Controlling Systems with OT
- Operational Technology (OT): Understanding OT and its components.
- ICS Components: Listing Industrial Control Systems (ICS) components.
- OT Protocols: Technologies and protocols used in OT.
- Challenges: Recognizing challenges within OT systems.
- MITRE ATT&CK for ICS: Utilizing frameworks to understand threats in ICS.
5. Exploiting OT Systems
- Penetration Testing: Methods for pentesting OT systems.
- Insights on OT Attacks: Providing detailed insights into OT-specific attack strategies.
- Vulnerability Search: Discovering vulnerabilities within OT environments.
- Targeting OT Systems: Strategies to target and exploit OT systems.
6. Defending Against Attacks
- Counter IoT Attacks: Techniques for countering attacks on IoT devices.
- Device Management: Managing and securing IoT devices effectively.
- Developing Secure Devices: Creating and implementing secure IoT devices.
- Zero Trust: Implementing Zero Trust principles in IoT security.
- Secure Framework Design: Designing frameworks to enhance IoT security.
Conclusion
- Next Steps: Guidance on continuing education and practice in IoT and OT security.
Additional Information
- Exercise Files: Available for hands-on practice.
- Course Access: Course may be available through organizational subscriptions.
- Mobile Learning: Options to download and view course content on mobile devices.
Note: This course is part of LinkedIn Learning and may require a subscription or trial to access full content.