IoT and OT Hacking: A Comprehensive Overview – EC-Council

1 minute, 43 seconds Read

/*! elementor – v3.17.0 – 08-11-2023 */
.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}

Date: January 16, 2024
Time: 8:30 AM EST | 2:30 PM CET | 7:00 PM IST
Topic: Exploring IoT and OT Hacking

Register Now

Abstract: Today, the Internet of Things (IoT) and Operational Technology (OT) are components of our daily lives. The IoT embodies billions of devices that collect and exchange data, and OT drives efficiency and connectivity in industrial sectors. This webinar explores IoT and OT Hacking, one of the modules in the C|EH, which provides a way to assess the overall cybersecurity posture of an organization. It further outlines the concept of the IoT and OT and recognizes the many security issues plaguing these tiny devices, such as inadequate authentication protocols and weak firmware security. You’ll learn how to attack and defend IoT and OT systems and understand why conducting an ethical hacking exercise on IoT and OT devices is crucial for organizations.

Key takeaways:

  • Importance of OT and IoT security
  • Current security capabilities and challenges associated with OT and IoT
  • Role of ethical hacking in IoT and OT security
  • Establishing penetration testing framework for IoT/OT pen testing


Lisa Bock, Security Ambassador

Lisa Bock is an experienced author with a demonstrated history of working in the e-learning industry. She is a security ambassador with a broad range of IT skills and knowledge, including Cisco Security, CyberOps, Wireshark, biometrics, Ethical Hacking, the IoT, and Generative AI. Lisa is an author for LinkedIn Learning and an award-winning speaker who has presented at several national conferences. She holds an MS in computer information systems/information assurance from UMGC. Lisa was an associate professor in the IT department at Pennsylvania College of Technology (Williamsport, PA) until her retirement in 2020.

*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)


Any Streams

AI Enabled Business & IT Automation

Similar Posts