Table of Contents
- IoT Penetration Testing
- IoT Threat Modeling
- Firmware Analysis and exploitation
- Exploitation of Embedded Web Applications
- Exploitation of IoT Mobile applications
- IoT Device Hacking
- RF Analysis and Testing
- Firmware Security Best Practices
- Mobile Security Best Practices
- Securing Hardware
- Advanced IoT exploitation and Security Automation

