3.2.1.5 Lab – Compromise IoT Device Hardware (Instructor Version) Topology Raspberry Pi Pinout Diagram Objectives Perform threat modeling activities to evaluate IoT device hardware and firmware. Part 1: Accessing the Raspberry Pi with Serial Interface Part 2: Disabling Serial Login Access to Raspberry Pi Background / Scenario This …
3.2.1.4 Lab – Investigate the FCC Database (Instructor Version) Objectives Use the Federal Communications Commission (FCC) database to view information about various IoT devices that utilize radio frequencies for data transmission. The database has information that could benefit both the user and a potential attacker. Part 1: Search …
2.2.2.8 Lab – Investigate IoT Security Requirements (Instructor Version) Objectives In this lab, you will learn about IoT security requirements by investigating OWASP critical IoT security vulnerabilities. Investigate OWASP. Investigate the OWASP IoT Top 10 Vulnerabilities. Investigate Vulnerabilities, Vulnerability Assessment, and Mitigation Measures. Background / Scenario In this …
2.2.1.4 Lab – Create an IoT Sensor-Actuator System (Instructor Version) Instructor Note: Red font color and completed code cells indicate that the information appears in the instructor copy only. Topology Connectivity requirements: As shown in the topology, the Raspberry Pi must be able to reach the Internet and …
1.2.3.4 Lab – Investigate Vulnerability Assessment Tools (Instructor Version) Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives Part 1: Exploring Kali Linux Part 2: Investigating Nmap and Zenmap Part 3: Using Wireshark to Open and Analyze a pcap …
1.2.3.3 Lab – Harden a Raspberry Pi (Instructor Version) Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Topology Objectives Part 1: Securing Remote Access Part 2: Removing the Default Pi User Account Part 3: Configuring the Uncomplicated Firewall (UFW) …
1.2.3.2 Lab – Set Up the IoT Security Lab Topology (Instructor Version) Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Topology Objectives Part 1: Setup the Lab Environment Part 2: Import the IoT Security Virtual Machines Background / Scenario …
1.2.3.1 Lab – Set Up PL-App on a Raspberry Pi (Instructor Version) Lab Topology Objectives Set up a Raspberry Pi board as a The Prototyping Lab Application (PL-App) device Use PL-App Launcher to provision and discover PL-App devices Background The IoT Security lab topology uses a Raspberry Pi …
1.2.2.9 Lab – Evaluate the IoT Security Risk in an Industry Sector (Instructor Version) Objectives Part 1: Research Risks for an Industry Sector Part 2: Investigate the Potential Impact of a Security Breach Part 3: Describe Security Measures for Your Industry Sector Background / Scenario Any implementation of …
1.2.1.3 Lab – Evaluate Home Automation Products (Instructor Version) Objectives Part 1: Conduct Research for Home Automation Products Part 2: Prepare a Presentation Background / Scenario In this lab, you will investigate the wide variety of home automation products. Some products may require monitoring or maintenance services, so …