IoT threat landscape
Network hacking
Hardware hacking
Radio hacking
Targeting the ecosystem
Identify, assess, and exploit basic and complex security mechanisms in IoT devices.