• Online, Self-Paced
Course Description

Examine the IoT hacking methodology and explore countermeasures that can be used to secure IoT devices.

Learning Objectives

CEHv10: IoT Hacking and Countermeasures

  • describe the IoT hacking methodology and common countermeasures for securing IoT devices

Framework Connections


If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.