From the course: Certified Ethical Hacker (CEH)

Unlock this course with a free trial

Join today to access over 24,600 courses taught by industry experts.

Module 6: Wireless, mobile, IoT, and OT hacking introduction

Module 6: Wireless, mobile, IoT, and OT hacking introduction

From the course: Certified Ethical Hacker (CEH)

Module 6: Wireless, mobile, IoT, and OT hacking introduction

- Welcome to Module 6: Wireless Mobile, IOT and OT Hacking. In this module, we will explore how we will hack mobile platforms and also with smartphones and other mobile devices now, as an integral parts of both our personal and professional lives, they have become prime targets for cybercriminals and for attackers, so we will explore the different vulnerabilities of mobile operating systems and the security implications of mobile apps and the different attack vectors that threaten these devices nowadays. Then we'll cover both IoT and operational technology systems, so you will learn about the techniques used to compromise Internet of Things, or IoT devices, and also critical components of operational technologies, like for example, SCADA devices, ICS systems and many others, so let's get started.

Contents