23 OCT 2025 - We are back! If you have been following us over the last few years, you will know that the last 2 months have been rough. We website was practically not loading. Sorry for the mess. We are back though and everything should run smoothly now. New servers. Updated domains. And new owners. We invite you all to start uploading torrents again!
The number of IoT (Internet of Things) devices deployed is increasing exponentially, which presents significant security challenges. In this course, Lisa Bock covers topics related to the IoT and OT hacking domain from the CEH body of knowledge. Lisa dives into the myriad of security challenges that the IoT faces, highlighting the importance of conducting ethical hacking to unearth vulnerabilities within IoT and operational technology (OT) devices. The course covers strategies for managing OT and industrial control systems (ICS). Furthermore, Lisa outlines methods for executing attacks on IoT/OT systems along with ways to safeguard systems against potential attacks, to ensure participants are well-equipped to protect these technologies. To help apply these concepts, Lisa provides a list of resources for best practice frameworks and guidance on securing IoT/OT systems. At the end of the course, you will have a robust arsenal to navigate the complex landscape of IoT security.
Regards!
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
01 - Introduction/01 - Hacking IoT and OT systems.mp4
3.5 MB
01 - Introduction/01 - Hacking IoT and OT systems.srt
1.3 KB
01 - Introduction/02 - Getting the most from this course.mp4
1.5 MB
01 - Introduction/02 - Getting the most from this course.srt
1.5 KB
01 - Introduction/03 - Hacking ethically.mp4
1.4 MB
01 - Introduction/03 - Hacking ethically.srt
1.3 KB
02 - 1. Understanding the IoT/01 - Defining the IoT.mp4
5.8 MB
02 - 1. Understanding the IoT/01 - Defining the IoT.srt
4.2 KB
02 - 1. Understanding the IoT/02 - Gathering data.mp4
6.9 MB
02 - 1. Understanding the IoT/02 - Gathering data.srt
5.8 KB
02 - 1. Understanding the IoT/03 - Exchanging information.mp4
6.6 MB
02 - 1. Understanding the IoT/03 - Exchanging information.srt
5.3 KB
02 - 1. Understanding the IoT/04 - Challenge Enemybot.mp4
1.7 MB
02 - 1. Understanding the IoT/04 - Challenge Enemybot.srt
1.3 KB
02 - 1. Understanding the IoT/05 - Solution Enemybot.mp4
5.2 MB
02 - 1. Understanding the IoT/05 - Solution Enemybot.srt