0. Websites you may like/How you can help Team-FTU.txt 229 B 01.Introduction/01.01.Understand the hacking of IoT devices.mp4 13 MB 01.Introduction/01.01.Understand the hacking of IoT devices.srt 1.6 KB 01.Introduction/01.02.What you should know.mp4 1.3 MB 01.Introduction/01.02.What you should know.srt 529 B 02.Dissecting the Internet of Things/02.03.How the Internet of Things works.mp4 6.7 MB 02.Dissecting the Internet of Things/02.03.How the Internet of Things works.srt 4.8 KB 02.Dissecting the Internet of Things/02.04.IoT technologies and protocols.mp4 5.2 MB 02.Dissecting the Internet of Things/02.04.IoT technologies and protocols.srt 4.8 KB 02.Dissecting the Internet of Things/02.05.IoT communication models.mp4 4.3 MB 02.Dissecting the Internet of Things/02.05.IoT communication models.srt 3.8 KB 03.Understanding IoT Attacks/03.06.Challenges of IoT.mp4 5.6 MB 03.Understanding IoT Attacks/03.06.Challenges of IoT.srt 4 KB 03.Understanding IoT Attacks/03.07.OWASP top ten vulnerabilities.mp4 12.1 MB 03.Understanding IoT Attacks/03.07.OWASP top ten vulnerabilities.srt 5.3 KB 03.Understanding IoT Attacks/03.08.IoT attack areas.mp4 6.3 MB 03.Understanding IoT Attacks/03.08.IoT attack areas.srt 4.3 KB 03.Understanding IoT Attacks/03.09.IoT attacks.mp4 5.5 MB 03.Understanding IoT Attacks/03.09.IoT attacks.srt 3.6 KB 03.Understanding IoT Attacks/03.10.IoT hacking methodology.mp4 8.8 MB 03.Understanding IoT Attacks/03.10.IoT hacking methodology.srt 3.5 KB 03.Understanding IoT Attacks/03.11.IoT hacking demonstration, part 1.mp4 8.8 MB 03.Understanding IoT Attacks/03.11.IoT hacking demonstration, part 1.srt 5 KB 03.Understanding IoT Attacks/03.12.IoT hacking demonstration, part 2.mp4 18.1 MB 03.Understanding IoT Attacks/03.12.IoT hacking demonstration, part 2.srt 5.9 KB 04.Countermeasure/04.13.Securing IoT devices.mp4 5.2 MB 04.Countermeasure/04.13.Securing IoT devices.srt 3.1 KB 05.Conclusion/05.14.Next steps.mp4 7.1 MB 05.Conclusion/05.14.Next steps.srt 1.7 KB