Module 4 – Scenario: Discovery of Sensitive Devices
- Hands-on Scenario: Information Discovery
- Hands-on Scenario: Network Hacking via loT
- Hands-on Scenario: Hacking Smart Devices
- Hands-on Scenario: Ransomware attacks
- Hands-on Scenario: Sabotaging Gate Controls in Airport
Module 5 – Controlling SCADA Systems
- Hands-on Scenario: SCADA Security
- Hands-on Scenario: Dos & DDoS
- Hands-on Scenario: Deploying Malware on loT
Module 6 – Defensive Measures
- Hands-on: Threat Intelligence
- Hands-on: Endpoint Protection
- Employee training
- Other Security Softwares
- Hands-on: Conducting effective VAPT on IOT /SCADA
- Reporting best practices