23 OCT 2025 - We are back! If you have been following us over the last few years, you will know that the last 2 months have been rough. We website was practically not loading. Sorry for the mess. We are back though and everything should run smoothly now. New servers. Updated domains. And new owners. We invite you all to start uploading torrents again!
The number of IoT (internet of things) devices being deployed is growing exponentially and securing those devices is a huge challenge. In this course, Luciano Ferrari discusses how IoT devices work, including the architectures and protocols used. He covers the main attack surfaces used by hackers and security professionals against IoT devices, how to assess IoT security threats and vulnerabilities, and how to properly secure the devices by following industry best practices and implementing countermeasures.
Topics Include:
• How IoT devices work
• IoT technologies and protocols
• IoT communication models
• Common OWASP vulnerabilities
• Overcoming inherent IoT challenges
• Attacks occurring on IoT devices
• Methodologies used for hacking
• Securing IoT devices.
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
0. Websites you may like/How you can help Team-FTU.txt
229 B
01.Introduction/01.01.Understand the hacking of IoT devices.mp4
13 MB
01.Introduction/01.01.Understand the hacking of IoT devices.srt
1.6 KB
01.Introduction/01.02.What you should know.mp4
1.3 MB
01.Introduction/01.02.What you should know.srt
529 B
02.Dissecting the Internet of Things/02.03.How the Internet of Things works.mp4
6.7 MB
02.Dissecting the Internet of Things/02.03.How the Internet of Things works.srt
4.8 KB
02.Dissecting the Internet of Things/02.04.IoT technologies and protocols.mp4
5.2 MB
02.Dissecting the Internet of Things/02.04.IoT technologies and protocols.srt
4.8 KB
02.Dissecting the Internet of Things/02.05.IoT communication models.mp4
4.3 MB
02.Dissecting the Internet of Things/02.05.IoT communication models.srt
3.8 KB
03.Understanding IoT Attacks/03.06.Challenges of IoT.mp4
5.6 MB
03.Understanding IoT Attacks/03.06.Challenges of IoT.srt
4 KB
03.Understanding IoT Attacks/03.07.OWASP top ten vulnerabilities.mp4
12.1 MB
03.Understanding IoT Attacks/03.07.OWASP top ten vulnerabilities.srt