What You Need to Know Before
You Start
Starts 10 June 2025 03:49
Ends 10 June 2025
00
days
00
hours
00
minutes
00
seconds
23 minutes
Optional upgrade avallable
Not Specified
Progress at your own speed
Conference Talk
Optional upgrade avallable
Overview
Explore Mirai-based IoT botnets like Satori, OMG, and Owari. Learn about their configurations, obfuscation techniques, and exploitation methods for improved network security.
Syllabus
- Introduction to IoT Botnets
- Understanding the Mirai Botnet
- Exploring Mirai Variants
- Configurations of IoT Botnets
- Obfuscation Techniques in IoT Botnets
- Exploitation Methods
- Strategies for Network Security
- Case Studies and Real-world Impacts
- Future Trends in IoT Botnets
- Course Summary and Key Takeaways
- Additional Resources and Further Reading
Definition and Overview of IoT Botnets
Historical Context and Emergence of IoT Botnets
Genesis and Evolution of Mirai
Core Architecture and Workflow
Mirai's Impact on Cybersecurity
Satori Botnet
Configurations and Capabilities
Specific Exploitation Tactics
OMG Botnet
Unique Features and Innovations
Deployment Techniques
Owari Botnet
Operational Strategies
Enhancement over Mirai
Common Configuration Patterns
Tailoring Configurations for IoT Devices
Techniques Used in Mirai Variants
Counteracting Obfuscation in Network Defense
Identifying Vulnerabilities in IoT Devices
Exploitation Methods Used by Satori, OMG, and Owari
Monitoring and Detection of IoT Botnets
Proactive Security Measures
Hardening IoT Devices
Notable Attacks Using Mirai-based Botnets
Lessons Learned and Security Implications
Evolving Threat Landscape
Innovations in Botnet Architectures
Recap of Critical Concepts Covered
Final Q&A Session
Recommended Texts and Articles
Access to Online Tools and Datasets for Further Exploration
Subjects
Conference Talks