Cyber TalksRecent CybertalksIOT FROM AN ATTACKER’S PERSPECTIVEa

Venkata Hareesh Peddiraju" width="200" /></p><p><strong>Name:</strong> Venkata Hareesh Peddiraju, Technology Security Senior Analyst<br /><strong>Topic:</strong> IoT from an Attacker’s Perspective<br /><strong>Date of Webinar:</strong> 26th September<br /><strong>Time and Location:</strong> 6:30pm IST/1pm GMT/9am EST</p><a href="#register" class="su-button su-button-style-flat alignleft" style="color:#ffffff;background-color:#a51c30;border-color:#841727;border-radius:0px;-moz-border-radius:0px;-webkit-border-radius:0px" target="_self"><span style="color:#ffffff;padding:0px 20px;font-size:16px;line-height:32px;border-color:#c0616f;border-radius:0px;-moz-border-radius:0px;-webkit-border-radius:0px;text-shadow:0px 0px 0px #000000;-moz-text-shadow:0px 0px 0px #000000;-webkit-text-shadow:0px 0px 0px #000000"> Watch Now</span></a><p> </p><p> </p><p><strong>Speaker Bio:</strong> Venkata Hareesh Peddiraju is an Information Security enthusiast who is an avid security researcher. Venkat has worked extensively in carrying out Penetration Tests on Web Applications, Mobile Applications, Web Services and IT Infrastructure. For over a year now, he has been carrying out PenTests and researches on IoT solutions. Source Code Analysis, Firmware analysis, Binary analysis have been the run-of-the-mill…</p><p>Topic Abstract: IoT has gotten a lot of traction lately and has found it’s applications widely in areas such as Home Automation, Healthcare, Automobiles and Industrial applications. This has opened up a substantial amount of attack surface when seen from an Attacker’s perspective. For instance, Home Automation sector has grown significantly to this point of time, where almost every device / appliance in our homes can now be SMART. When a device gets “Smart”, it connects to a home network and in turn to the Internet; which enables the consumers to interact with such devices from any part of the world. As convenient as this may sound, this makes Every Connected Device in our home a Potential Entry Point. Even compromising a single IoT device could let the attacker into the home network and control other devices connected to the same network.</p><p>This talk is devised to showcase the increase in attack surface with the introduction of IoT as well as various attack scenarios through which an IoT device could be compromised by an attacker.</p><p style="font-size: 10px; font-weight: bold;">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)</p><p><a name="register"></a></p>	<div class="wpb_video_widget wpb_content_element vc_clearfix   vc_video-aspect-ratio-169 vc_video-el-width-100 vc_video-align-center" >		<div class="wpb_wrapper">			<h2 class="wpb_heading wpb_video_heading">Watch The Webinar</h2>			<div class="wpb_video_wrapper"><iframe title="IoT from an Attacker’s Perspective by Venkata Hareesh" width="413" height="310" src="https://www.youtube.com/embed/iY6Qj4lx44s?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen></iframe></div>		</div>	</div></div></div><div class="post-meta wf-mobile-collapsed"><div class="entry-meta"><span class="category-link">Categories: <a href="https://www.eccu.edu/category/cyber-talks/" >Cyber Talks</a>, <a href="https://www.eccu.edu/category/cyber-talks/recent-cybertalks/" >Recent Cybertalks</a></span><a class="author vcard" href="https://www.eccu.edu/author/rabbani/" title="View all posts by EC-Council University" rel="author">By <span class="fn">EC-Council University</span></a><a href="https://www.eccu.edu/2018/08/31/" title="5:16 am" class="data-link" rel="bookmark"><time class="entry-date updated" datetime="2018-08-31T05:16:06+00:00">August 31, 2018</time></a></div></div><div class="single-share-box">	<div class="share-link-description"><span class="share-link-icon"><svg version="1.1" id="Layer_1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" x="0px" y="0px" viewBox="0 0 16 16" style="enable-background:new 0 0 16 16;" xml:space="preserve"><path d="M11,2.5C11,1.1,12.1,0,13.5,0S16,1.1,16,2.5C16,3.9,14.9,5,13.5,5c-0.7,0-1.4-0.3-1.9-0.9L4.9,7.2c0.2,0.5,0.2,1,0,1.5l6.7,3.1c0.9-1,2.5-1.2,3.5-0.3s1.2,2.5,0.3,3.5s-2.5,1.2-3.5,0.3c-0.8-0.7-1.1-1.7-0.8-2.6L4.4,9.6c-0.9,1-2.5,1.2-3.5,0.3s-1.2-2.5-0.3-3.5s2.5-1.2,3.5-0.3c0.1,0.1,0.2,0.2,0.3,0.3l6.7-3.1C11,3,11,2.8,11,2.5z"/></svg></span>Share this post</div>	<div class="share-buttons">		<a class="facebook" href="https://www.facebook.com/sharer.php?u=https%3A%2F%2Fwww.eccu.edu%2Fcyber-talks%2Frecent-cybertalks%2Fiot-from-an-attackers-perspective%2F&t=IoT+from+an+Attacker%E2%80%99s+Perspective" title="Facebook" target="_blank" ><svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" fill="currentColor" class="bi bi-facebook" viewBox="0 0 16 16"><path d="M16 8.049c0-4.446-3.582-8.05-8-8.05C3.58 0-.002 3.603-.002 8.05c0 4.017 2.926 7.347 6.75 7.951v-5.625h-2.03V8.05H6.75V6.275c0-2.017 1.195-3.131 3.022-3.131.876 0 1.791.157 1.791.157v1.98h-1.009c-.993 0-1.303.621-1.303 1.258v1.51h2.218l-.354 2.326H9.25V16c3.824-.604 6.75-3.934 6.75-7.951z"/></svg><span class="soc-font-icon"></span><span class="social-text">Share on Facebook</span><span class="screen-reader-text">Share on Facebook</span></a><a class="twitter" href="https://twitter.com/share?url=https%3A%2F%2Fwww.eccu.edu%2Fcyber-talks%2Frecent-cybertalks%2Fiot-from-an-attackers-perspective%2F&text=IoT+from+an+Attacker%E2%80%99s+Perspective" title="Twitter" target="_blank" ><svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" fill="currentColor" class="bi bi-twitter" viewBox="0 0 16 16"><path d="M5.026 15c6.038 0 9.341-5.003 9.341-9.334 0-.14 0-.282-.006-.422A6.685 6.685 0 0 0 16 3.542a6.658 6.658 0 0 1-1.889.518 3.301 3.301 0 0 0 1.447-1.817 6.533 6.533 0 0 1-2.087.793A3.286 3.286 0 0 0 7.875 6.03a9.325 9.325 0 0 1-6.767-3.429 3.289 3.289 0 0 0 1.018 4.382A3.323 3.323 0 0 1 .64 6.575v.045a3.288 3.288 0 0 0 2.632 3.218 3.203 3.203 0 0 1-.865.115 3.23 3.23 0 0 1-.614-.057 3.283 3.283 0 0 0 3.067 2.277A6.588 6.588 0 0 1 .78 13.58a6.32 6.32 0 0 1-.78-.045A9.344 9.344 0 0 0 5.026 15z"/></svg><span class="soc-font-icon"></span><span class="social-text">Tweet</span><span class="screen-reader-text">Share on Twitter</span></a><a class="pinterest pinit-marklet" href="//pinterest.com/pin/create/button/" title="Pinterest" target="_blank"  data-pin-config="above" data-pin-do="buttonBookmark"><svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" fill="currentColor" class="bi bi-pinterest" viewBox="0 0 16 16"><path d="M8 0a8 8 0 0 0-2.915 15.452c-.07-.633-.134-1.606.027-2.297.146-.625.938-3.977.938-3.977s-.239-.479-.239-1.187c0-1.113.645-1.943 1.448-1.943.682 0 1.012.512 1.012 1.127 0 .686-.437 1.712-.663 2.663-.188.796.4 1.446 1.185 1.446 1.422 0 2.515-1.5 2.515-3.664 0-1.915-1.377-3.254-3.342-3.254-2.276 0-3.612 1.707-3.612 3.471 0 .688.265 1.425.595 1.826a.24.24 0 0 1 .056.23c-.061.252-.196.796-.222.907-.035.146-.116.177-.268.107-1-.465-1.624-1.926-1.624-3.1 0-2.523 1.834-4.84 5.286-4.84 2.775 0 4.932 1.977 4.932 4.62 0 2.757-1.739 4.976-4.151 4.976-.811 0-1.573-.421-1.834-.919l-.498 1.902c-.181.695-.669 1.566-.995 2.097A8 8 0 1 0 8 0z"/></svg><span class="soc-font-icon"></span><span class="social-text">Pin it</span><span class="screen-reader-text">Share on Pinterest</span></a><a class="linkedin" href="https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww.eccu.edu%2Fcyber-talks%2Frecent-cybertalks%2Fiot-from-an-attackers-perspective%2F&title=IoT%20from%20an%20Attacker%E2%80%99s%20Perspective&summary=&source=Accredited%20Online%20Cyber%20Security%20Degree%20Programs%20%7C%20EC-Council%20University" title="LinkedIn" target="_blank" ><svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" fill="currentColor" class="bi bi-linkedin" viewBox="0 0 16 16"><path d="M0 1.146C0 .513.526 0 1.175 0h13.65C15.474 0 16 .513 16 1.146v13.708c0 .633-.526 1.146-1.175 1.146H1.175C.526 16 0 15.487 0 14.854V1.146zm4.943 12.248V6.169H2.542v7.225h2.401zm-1.2-8.212c.837 0 1.358-.554 1.358-1.248-.015-.709-.52-1.248-1.342-1.248-.822 0-1.359.54-1.359 1.248 0 .694.521 1.248 1.327 1.248h.016zm4.908 8.212V9.359c0-.216.016-.432.08-.586.173-.431.568-.878 1.232-.878.869 0 1.216.662 1.216 1.634v3.865h2.401V9.25c0-2.22-1.184-3.252-2.764-3.252-1.274 0-1.845.7-2.165 1.193v.025h-.016a5.54 5.54 0 0 1 .016-.025V6.169h-2.4c.03.678 0 7.225 0 7.225h2.4z"/></svg><span class="soc-font-icon"></span><span class="social-text">Share on LinkedIn</span><span class="screen-reader-text">Share on LinkedIn</span></a><a class="whatsapp" href="https://api.whatsapp.com/send?text=IoT%20from%20an%20Attacker%E2%80%99s%20Perspective%20-%20https%3A%2F%2Fwww.eccu.edu%2Fcyber-talks%2Frecent-cybertalks%2Fiot-from-an-attackers-perspective%2F" title="WhatsApp" target="_blank"  data-action="share/whatsapp/share"><svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" fill="currentColor" class="bi bi-whatsapp" viewBox="0 0 16 16"><path d="M13.601 2.326A7.854 7.854 0 0 0 7.994 0C3.627 0 .068 3.558.064 7.926c0 1.399.366 2.76 1.057 3.965L0 16l4.204-1.102a7.933 7.933 0 0 0 3.79.965h.004c4.368 0 7.926-3.558 7.93-7.93A7.898 7.898 0 0 0 13.6 2.326zM7.994 14.521a6.573 6.573 0 0 1-3.356-.92l-.24-.144-2.494.654.666-2.433-.156-.251a6.56 6.56 0 0 1-1.007-3.505c0-3.626 2.957-6.584 6.591-6.584a6.56 6.56 0 0 1 4.66 1.931 6.557 6.557 0 0 1 1.928 4.66c-.004 3.639-2.961 6.592-6.592 6.592zm3.615-4.934c-.197-.099-1.17-.578-1.353-.646-.182-.065-.315-.099-.445.099-.133.197-.513.646-.627.775-.114.133-.232.148-.43.05-.197-.1-.836-.308-1.592-.985-.59-.525-.985-1.175-1.103-1.372-.114-.198-.011-.304.088-.403.087-.088.197-.232.296-.346.1-.114.133-.198.198-.33.065-.134.034-.248-.015-.347-.05-.099-.445-1.076-.612-1.47-.16-.389-.323-.335-.445-.34-.114-.007-.247-.007-.38-.007a.729.729 0 0 0-.529.247c-.182.198-.691.677-.691 1.654 0 .977.71 1.916.81 2.049.098.133 1.394 2.132 3.383 2.992.47.205.84.326 1.129.418.475.152.904.129 1.246.08.38-.058 1.171-.48 1.338-.943.164-.464.164-.86.114-.943-.049-.084-.182-.133-.38-.232z"/></svg><span class="soc-font-icon"></span><span class="social-text">Share on WhatsApp</span><span class="screen-reader-text">Share on WhatsApp</span></a>	</div></div><nav class="navigation post-navigation" role="navigation"><h2 class="screen-reader-text">Post navigation</h2><div class="nav-links"><a class="nav-previous" href="https://www.eccu.edu/cyber-talks/recent-cybertalks/multidimensional-cyber-attacks/" rel="prev"><svg version="1.1" id="Layer_1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" x="0px" y="0px" viewBox="0 0 16 16" style="enable-background:new 0 0 16 16;" xml:space="preserve"><path class="st0" d="M11.4,1.6c0.2,0.2,0.2,0.5,0,0.7c0,0,0,0,0,0L5.7,8l5.6,5.6c0.2,0.2,0.2,0.5,0,0.7s-0.5,0.2-0.7,0l-6-6c-0.2-0.2-0.2-0.5,0-0.7c0,0,0,0,0,0l6-6C10.8,1.5,11.2,1.5,11.4,1.6C11.4,1.6,11.4,1.6,11.4,1.6z"/></svg><span class="meta-nav" aria-hidden="true">Previous</span><span class="screen-reader-text">Previous post:</span><span class="post-title h4-size">Multi-dimensional Cyber-Attacks</span></a><a class="nav-next" href="https://www.eccu.edu/cyber-talks/recent-cybertalks/making-the-web-secure-by-design/" rel="next"><svg version="1.1" id="Layer_1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" x="0px" y="0px" viewBox="0 0 16 16" style="enable-background:new 0 0 16 16;" xml:space="preserve"><path class="st0" d="M4.6,1.6c0.2-0.2,0.5-0.2,0.7,0c0,0,0,0,0,0l6,6c0.2,0.2,0.2,0.5,0,0.7c0,0,0,0,0,0l-6,6c-0.2,0.2-0.5,0.2-0.7,0s-0.2-0.5,0-0.7L10.3,8L4.6,2.4C4.5,2.2,4.5,1.8,4.6,1.6C4.6,1.6,4.6,1.6,4.6,1.6z"/></svg><span class="meta-nav" aria-hidden="true">Next</span><span class="screen-reader-text">Next post:</span><span class="post-title h4-size">Making the Web Secure, by Design!</span></a></div></nav><div class="single-related-posts"><h3>Related Posts</h3><section class="items-grid"><div class=" related-item"><article class="post-format-standard"><div class="mini-post-img"><a class="alignleft post-rollover layzr-bg" href="https://www.eccu.edu/cyber-talks/recent-cybertalks/practical-guide-to-starting-a-career-in-cybersecurity/" aria-label="Post image"><img class="preload-me lazy-load aspect" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20110%2080'%2F%3E" data-src="https://www.eccu.edu/wp-content/uploads/2023/08/A-Practical-Guide-to-Building-a-Career-in-Cybersecurity-110x80.jpg" data-srcset="https://www.eccu.edu/wp-content/uploads/2023/08/A-Practical-Guide-to-Building-a-Career-in-Cybersecurity-110x80.jpg 110w, https://www.eccu.edu/wp-content/uploads/2023/08/A-Practical-Guide-to-Building-a-Career-in-Cybersecurity-220x160.jpg 220w" loading="eager" style="--ratio: 110 / 80" sizes="(max-width: 110px) 100vw, 110px" width="110" height="80"  alt="" /></a></div><div class="post-content"><a href="https://www.eccu.edu/cyber-talks/recent-cybertalks/practical-guide-to-starting-a-career-in-cybersecurity/">A Practical Guide to Building a Career in Cybersecurity</a><br /><time class="text-secondary" datetime="2023-11-18T04:39:56+00:00">November 18, 2023</time></div></article></div><div class=" related-item"><article class="post-format-standard"><div class="mini-post-img"><a class="alignleft post-rollover layzr-bg" href="https://www.eccu.edu/cyber-talks/recent-cybertalks/a-cisos-advice-on-cyber-resilience-best-practices/" aria-label="Post image"><img class="preload-me lazy-load aspect" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20110%2080'%2F%3E" data-src="https://www.eccu.edu/wp-content/uploads/2023/08/A-CISOs-Advice-on-Cyber-Resilience-Best-Practices-2-110x80.jpg" data-srcset="https://www.eccu.edu/wp-content/uploads/2023/08/A-CISOs-Advice-on-Cyber-Resilience-Best-Practices-2-110x80.jpg 110w, https://www.eccu.edu/wp-content/uploads/2023/08/A-CISOs-Advice-on-Cyber-Resilience-Best-Practices-2-220x160.jpg 220w" loading="eager" style="--ratio: 110 / 80" sizes="(max-width: 110px) 100vw, 110px" width="110" height="80"  alt="A CISO’s Advice on Cyber Resilience Best Practices" /></a></div><div class="post-content"><a href="https://www.eccu.edu/cyber-talks/recent-cybertalks/a-cisos-advice-on-cyber-resilience-best-practices/">The CISO’s Guide to Cyber Resilience: Best Practices and Pitfalls to Avoid</a><br /><time class="text-secondary" datetime="2023-11-11T00:00:27+00:00">November 11, 2023</time></div></article></div><div class=" related-item"><article class="post-format-standard"><div class="mini-post-img"><a class="alignleft post-rollover layzr-bg" href="https://www.eccu.edu/cyber-talks/recent-cybertalks/importance-of-cybersecurity-knowledge-for-it-professionals/" aria-label="Post image"><img class="preload-me lazy-load aspect" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20110%2080'%2F%3E" data-src="https://www.eccu.edu/wp-content/uploads/2023/08/465X310-2-110x80.jpg" data-srcset="https://www.eccu.edu/wp-content/uploads/2023/08/465X310-2-110x80.jpg 110w, https://www.eccu.edu/wp-content/uploads/2023/08/465X310-2-220x160.jpg 220w" loading="eager" style="--ratio: 110 / 80" sizes="(max-width: 110px) 100vw, 110px" width="110" height="80"  alt="Why are Strong Foundational Cybersecurity Skills Essential for Every IT Professional" /></a></div><div class="post-content"><a href="https://www.eccu.edu/cyber-talks/recent-cybertalks/importance-of-cybersecurity-knowledge-for-it-professionals/">Why Are Strong Foundational Cybersecurity Skills Essential for Every IT Professional?</a><br /><time class="text-secondary" datetime="2023-11-08T05:29:14+00:00">November 8, 2023</time></div></article></div><div class=" related-item"><article class="post-format-standard"><div class="mini-post-img"><a class="alignleft post-rollover layzr-bg" href="https://www.eccu.edu/cyber-talks/recent-cybertalks/digital-forensics-best-practices/" aria-label="Post image"><img class="preload-me lazy-load aspect" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20110%2080'%2F%3E" data-src="https://www.eccu.edu/wp-content/uploads/2023/10/Digital-Forensics-Best-Practices-110x80.jpg" data-srcset="https://www.eccu.edu/wp-content/uploads/2023/10/Digital-Forensics-Best-Practices-110x80.jpg 110w, https://www.eccu.edu/wp-content/uploads/2023/10/Digital-Forensics-Best-Practices-220x160.jpg 220w" loading="eager" style="--ratio: 110 / 80" sizes="(max-width: 110px) 100vw, 110px" width="110" height="80"  alt="" /></a></div><div class="post-content"><a href="https://www.eccu.edu/cyber-talks/recent-cybertalks/digital-forensics-best-practices/">Digital Forensics Best Practices: From Data Acquisition to Analysis</a><br /><time class="text-secondary" datetime="2023-11-05T12:12:27+00:00">November 5, 2023</time></div></article></div></section></div></article><div id="bsf-rt-comments"></div>	<div id="comments" class="comments-area">			<h3>7 Comments</h3>				<ol class="comment-list">					<li class="pingback">			<div class="pingback-content">				<span>Pingback:</span>				<a href="https://ewot.my.id" class="url" rel="ugc external nofollow">ewot</a>							</div>		</li><!-- #comment-## -->		<li class="pingback">			<div class="pingback-content">				<span>Pingback:</span>				<a href="https://erwinpratama.com" class="url" rel="ugc external nofollow">erwin pratama</a>							</div>		</li><!-- #comment-## -->		<li class="pingback">			<div class="pingback-content">				<span>Pingback:</span>				<a href="http://topbaricitinib.com" class="url" rel="ugc external nofollow">baricitinib olumiant</a>							</div>		</li><!-- #comment-## -->		<li class="pingback">			<div class="pingback-content">				<span>Pingback:</span>				<a href="https://topzanaflex.com" class="url" rel="ugc external nofollow">8 mg tizanidine</a>							</div>		</li><!-- #comment-## -->		<li class="pingback">			<div class="pingback-content">				<span>Pingback:</span>				<a href="https://topnolvadex.com" class="url" rel="ugc external nofollow">tamoxifen sale</a>							</div>		</li><!-- #comment-## -->		<li class="pingback">			<div class="pingback-content">				<span>Pingback:</span>				<a href="https://topbaricitinib.com" class="url" rel="ugc external nofollow">baricitinib 4 mg</a>							</div>		</li><!-- #comment-## -->		<li class="pingback">			<div class="pingback-content">				<span>Pingback:</span>				<a href="https://topmolnupiravir.com" class="url" rel="ugc external nofollow">molnupinavir</a>							</div>		</li><!-- #comment-## -->		</ol><!-- .comment-list -->						<p class="nocomments">Comments are closed.</p>				</div><!-- #comments .comments-area -->			</div><!-- #content -->				<aside id="sidebar" class="sidebar bg-under-widget sidebar-outline-decoration">		<div class="sidebar-content widget-divider-off">			<section id="presscore-blog-posts-4" class="widget widget_presscore-blog-posts"><div class="widget-title">Recent Posts</div><ul class="recent-posts"><li><article class="post-format-standard"><div class="mini-post-img"><a class="alignleft post-rollover layzr-bg" href="https://www.eccu.edu/cyber-talks/recent-cybertalks/practical-guide-to-starting-a-career-in-cybersecurity/" aria-label="Post image"><img class="preload-me lazy-load aspect" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%2050%2040'%2F%3E" data-src="https://www.eccu.edu/wp-content/uploads/2023/08/A-Practical-Guide-to-Building-a-Career-in-Cybersecurity-50x40.jpg" data-srcset="https://www.eccu.edu/wp-content/uploads/2023/08/A-Practical-Guide-to-Building-a-Career-in-Cybersecurity-50x40.jpg 50w, https://www.eccu.edu/wp-content/uploads/2023/08/A-Practical-Guide-to-Building-a-Career-in-Cybersecurity-100x80.jpg 100w" loading="eager" style="--ratio: 50 / 40" sizes="(max-width: 50px) 100vw, 50px" width="50" height="40"  alt="" /></a></div><div class="post-content"><a href="https://www.eccu.edu/cyber-talks/recent-cybertalks/practical-guide-to-starting-a-career-in-cybersecurity/">A Practical Guide to Building a Career in Cybersecurity</a><br /><time datetime="2023-11-18T04:39:56+00:00">November 18, 2023</time></div></article></li><li><article class="post-format-standard"><div class="mini-post-img"><a class="alignleft post-rollover layzr-bg" href="https://www.eccu.edu/success-stories/isaiah-visarraga/" aria-label="Post image"><img class="preload-me lazy-load aspect" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%2050%2040'%2F%3E" data-src="https://www.eccu.edu/wp-content/uploads/2023/11/Isaiah-Success-with-ec-council-50x40.png" data-srcset="https://www.eccu.edu/wp-content/uploads/2023/11/Isaiah-Success-with-ec-council-50x40.png 50w, https://www.eccu.edu/wp-content/uploads/2023/11/Isaiah-Success-with-ec-council-100x80.png 100w" loading="eager" style="--ratio: 50 / 40" sizes="(max-width: 50px) 100vw, 50px" width="50" height="40"  alt="" /></a></div><div class="post-content"><a href="https://www.eccu.edu/success-stories/isaiah-visarraga/">Isaiah Visarraga: A Success Story with EC-Council University</a><br /><time datetime="2023-11-14T10:03:01+00:00">November 14, 2023</time></div></article></li><li><article class="post-format-standard"><div class="mini-post-img"><a class="alignleft post-rollover layzr-bg" href="https://www.eccu.edu/cyber-talks/recent-cybertalks/a-cisos-advice-on-cyber-resilience-best-practices/" aria-label="Post image"><img class="preload-me lazy-load aspect" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%2050%2040'%2F%3E" data-src="https://www.eccu.edu/wp-content/uploads/2023/08/A-CISOs-Advice-on-Cyber-Resilience-Best-Practices-2-50x40.jpg" data-srcset="https://www.eccu.edu/wp-content/uploads/2023/08/A-CISOs-Advice-on-Cyber-Resilience-Best-Practices-2-50x40.jpg 50w, https://www.eccu.edu/wp-content/uploads/2023/08/A-CISOs-Advice-on-Cyber-Resilience-Best-Practices-2-100x80.jpg 100w" loading="eager" style="--ratio: 50 / 40" sizes="(max-width: 50px) 100vw, 50px" width="50" height="40"  alt="A CISO’s Advice on Cyber Resilience Best Practices" /></a></div><div class="post-content"><a href="https://www.eccu.edu/cyber-talks/recent-cybertalks/a-cisos-advice-on-cyber-resilience-best-practices/">The CISO’s Guide to Cyber Resilience: Best Practices and Pitfalls to Avoid</a><br /><time datetime="2023-11-11T00:00:27+00:00">November 11, 2023</time></div></article></li></ul></section><section id="presscore-blog-posts-3" class="widget widget_presscore-blog-posts"><div class="widget-title">Cyber Talks</div><ul class="recent-posts"><li><article class="post-format-standard"><div class="mini-post-img"><a class="alignleft post-rollover layzr-bg" href="https://www.eccu.edu/cyber-talks/recent-cybertalks/practical-guide-to-starting-a-career-in-cybersecurity/" aria-label="Post image"><img class="preload-me lazy-load aspect" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%2050%2040'%2F%3E" data-src="https://www.eccu.edu/wp-content/uploads/2023/08/A-Practical-Guide-to-Building-a-Career-in-Cybersecurity-50x40.jpg" data-srcset="https://www.eccu.edu/wp-content/uploads/2023/08/A-Practical-Guide-to-Building-a-Career-in-Cybersecurity-50x40.jpg 50w, https://www.eccu.edu/wp-content/uploads/2023/08/A-Practical-Guide-to-Building-a-Career-in-Cybersecurity-100x80.jpg 100w" loading="eager" style="--ratio: 50 / 40" sizes="(max-width: 50px) 100vw, 50px" width="50" height="40"  alt="" /></a></div><div class="post-content"><a href="https://www.eccu.edu/cyber-talks/recent-cybertalks/practical-guide-to-starting-a-career-in-cybersecurity/">A Practical Guide to Building a Career in Cybersecurity</a><br /><time datetime="2023-11-18T04:39:56+00:00">November 18, 2023</time></div></article></li><li><article class="post-format-standard"><div class="mini-post-img"><a class="alignleft post-rollover layzr-bg" href="https://www.eccu.edu/cyber-talks/recent-cybertalks/a-cisos-advice-on-cyber-resilience-best-practices/" aria-label="Post image"><img class="preload-me lazy-load aspect" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%2050%2040'%2F%3E" data-src="https://www.eccu.edu/wp-content/uploads/2023/08/A-CISOs-Advice-on-Cyber-Resilience-Best-Practices-2-50x40.jpg" data-srcset="https://www.eccu.edu/wp-content/uploads/2023/08/A-CISOs-Advice-on-Cyber-Resilience-Best-Practices-2-50x40.jpg 50w, https://www.eccu.edu/wp-content/uploads/2023/08/A-CISOs-Advice-on-Cyber-Resilience-Best-Practices-2-100x80.jpg 100w" loading="eager" style="--ratio: 50 / 40" sizes="(max-width: 50px) 100vw, 50px" width="50" height="40"  alt="A CISO’s Advice on Cyber Resilience Best Practices" /></a></div><div class="post-content"><a href="https://www.eccu.edu/cyber-talks/recent-cybertalks/a-cisos-advice-on-cyber-resilience-best-practices/">The CISO’s Guide to Cyber Resilience: Best Practices and Pitfalls to Avoid</a><br /><time datetime="2023-11-11T00:00:27+00:00">November 11, 2023</time></div></article></li><li><article class="post-format-standard"><div class="mini-post-img"><a class="alignleft post-rollover layzr-bg" href="https://www.eccu.edu/cyber-talks/recent-cybertalks/importance-of-cybersecurity-knowledge-for-it-professionals/" aria-label="Post image"><img class="preload-me lazy-load aspect" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%2050%2040'%2F%3E" data-src="https://www.eccu.edu/wp-content/uploads/2023/08/465X310-2-50x40.jpg" data-srcset="https://www.eccu.edu/wp-content/uploads/2023/08/465X310-2-50x40.jpg 50w, https://www.eccu.edu/wp-content/uploads/2023/08/465X310-2-100x80.jpg 100w" loading="eager" style="--ratio: 50 / 40" sizes="(max-width: 50px) 100vw, 50px" width="50" height="40"  alt="Why are Strong Foundational Cybersecurity Skills Essential for Every IT Professional" /></a></div><div class="post-content"><a href="https://www.eccu.edu/cyber-talks/recent-cybertalks/importance-of-cybersecurity-knowledge-for-it-professionals/">Why Are Strong Foundational Cybersecurity Skills Essential for Every IT Professional?</a><br /><time datetime="2023-11-08T05:29:14+00:00">November 8, 2023</time></div></article></li></ul></section><section id="custom_html-4" class="widget_text widget widget_custom_html"><div class="widget-title">INQUIRE NOW</div><div class="textwidget custom-html-widget"><style>	section#custom_html-4 {    max-width: 320px;}	#custom_html-4{		padding:0 !important	}	#custom_html-4 .widget-title{    background: #FBB52F;    color: #000;    text-align: center;    padding: 10px !important;    border: 1px solid #FBB52F;	}.textwidget * {    max-width: 400%;}	.font-w500{		width:auto !important;	}.form-row{    display: -ms-flexbox;    display: flex;    -ms-flex-wrap: wrap;    flex-wrap: wrap;    margin-right: 15px;    margin-left: 15px;}.form-row>.col, .form-row>[class*=col-] {    position: relative;    width: 100%;}.form-group {    margin-bottom: 1rem;}input[type="text"], .widget_search input[type="text"].searchform-s, input[type="search"], input[type="tel"], input[type="url"], input[type="email"], input[type="number"], input[type="date"], input[type="range"], input[type="password"], select, textarea, .wpcf7-number, .woocommerce div.elementor .the7-elementor-widget form.cart table.variations td.value select, .the7-elementor-product-comments .elementor-field-textual {    color: #333333;     border-top-width: 0px;    border-right-width: 0px;    border-bottom-width: 1px;    border-left-width: 0px;    padding: 0px;    border-color: rgba(51,51,51,0.12);    background-color: rgb(0 0 0 / 0%);    border-radius: 1px;}	::placeholder{		color: #333333 !important;	}.form-group label{  font-weight: 500;  font-size: 1rem;}.wpcf7-list-item {    margin: 0px !important;}.font-w500 + span{    font-weight: normal !important;    font-size: 12px !important;}.wpcf7-spinner {    position: absolute !important;    top: 8px!important;    right: -20px!important;}input.wpcf7-form-control.form-control::-webkit-input-placeholder {    color: #333 !important;    opacity: 1;}.form-control::-webkit-input-placeholder {    color: #333 !important;    opacity: 1;}</style><div class="wpcf7 no-js" id="wpcf7-f58117-p5022-o1" lang="en-US" dir="ltr"><div class="screen-reader-response"><p role="status" aria-live="polite" aria-atomic="true"></p> <ul></ul></div><form action="/cyber-talks/recent-cybertalks/iot-from-an-attackers-perspective/#wpcf7-f58117-p5022-o1" method="post" class="wpcf7-form init" aria-label="Contact form" novalidate="novalidate" data-status="init"><div style="display: none;"><input type="hidden" name="_wpcf7" value="58117" /><input type="hidden" name="_wpcf7_version" value="5.8.4" /><input type="hidden" name="_wpcf7_locale" value="en_US" /><input type="hidden" name="_wpcf7_unit_tag" value="wpcf7-f58117-p5022-o1" /><input type="hidden" name="_wpcf7_container_post" value="5022" /><input type="hidden" name="_wpcf7_posted_data_hash" value="" /></div><div class="form-row"> <div class="form-group col-sm-12">  <span class="wpcf7-form-control-wrap" data-name="Name"><input size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required form-control" aria-required="true" aria-invalid="false" placeholder="Name *" value="" type="text" name="Name" /></span> </div><div class="form-group col-sm-12">  <span class="wpcf7-form-control-wrap" data-name="Email"><input size="40" class="wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email form-control" aria-required="true" aria-invalid="false" placeholder="E-Mail Id *" value="" type="email" name="Email" /></span> </div><div class="form-group col-sm-12">  <span class="wpcf7-form-control-wrap MobileNumber"><input class="wpcf7-form-control wpcf7-tel wpcf7-validates-as-tel form-control" aria-invalid="false" placeholder="Phone Number*" value="" type="tel" name="MobileNumber_hide" data-name="MobileNumber"  data-pre="us|gb|in" data-excludeCountries="" data-onlyct="" data-defcountry="" data-auto="1" data-validation="1" /></span> </div><div class="form-group col-sm-12"><span class="wpcf7-form-control-wrap" data-name="Course"><select class="wpcf7-form-control wpcf7-select wpcf7-validates-as-required form-control" aria-required="true" aria-invalid="false" name="Course"><option value="">Select Program *</option><option value="Master of Science in Computer Science">Master of Science in Computer Science</option><option value="Master of Science in Cyber Security">Master of Science in Cyber Security</option><option value="Bachelor of Science in Cyber Security">Bachelor of Science in Cyber Security</option><option value="Graduate Certificate Program">Graduate Certificate Program</option><option value="Undergraduate Courses, Non Degree Status">Undergraduate Courses, Non Degree Status</option><option value="Graduate Courses, Non Degree Status">Graduate Courses, Non Degree Status</option></select></span></div><div class="form-group col-sm-12">  <span class="wpcf7-form-control-wrap" data-name="Textb3"><span class="wpcf7-form-control wpcf7-acceptance"><span class="wpcf7-list-item"><label><input type="checkbox" name="Textb3" value="1" class="font-w500" aria-invalid="false" /><span class="wpcf7-list-item-label">I agree with the <a href="https://www.eccu.edu/privacy-policy/" target="_blank" rel="noopener">Terms and Conditions</a>.<span class="red">*</span></span></label></span></span></span></div> <div style="display:none">  <span class="wpcf7-form-control-wrap Field2" data-name="Field2"><input type="hidden" name="Field2" size="40" class="wpcf7-form-control wpcf7-hidden wpcf7dtx wpcf7dtx-hidden" aria-invalid="false" autocomplete="off" /></span>   <span class="wpcf7-form-control-wrap leadChannel" data-name="leadChannel"><input type="hidden" name="leadChannel" size="40" class="wpcf7-form-control wpcf7-hidden wpcf7dtx wpcf7dtx-hidden" aria-invalid="false" value="IoT from an Attacker’s Perspective" autocomplete="off" /></span>    <!--<span class="wpcf7-form-control-wrap leadChannel" data-name="leadChannel"><input type="hidden" name="leadChannel" size="40" class="wpcf7-form-control wpcf7-hidden wpcf7dtx wpcf7dtx-hidden" aria-invalid="false" autocomplete="off" /></span>-->   <span class="wpcf7-form-control-wrap Field6" data-name="Field6"><input type="hidden" name="Field6" size="40" class="wpcf7-form-control wpcf7-hidden wpcf7dtx wpcf7dtx-hidden" aria-invalid="false" autocomplete="off" /></span>   <span class="wpcf7-form-control-wrap leadMedium" data-name="leadMedium"><input type="hidden" name="leadMedium" size="40" class="wpcf7-form-control wpcf7-hidden wpcf7dtx wpcf7dtx-hidden" aria-invalid="false" autocomplete="off" /></span>   <span class="wpcf7-form-control-wrap leadCampaign" data-name="leadCampaign"><input type="hidden" name="leadCampaign" size="40" class="wpcf7-form-control wpcf7-hidden wpcf7dtx wpcf7dtx-hidden" aria-invalid="false" autocomplete="off" /></span>   <span class="wpcf7-form-control-wrap sourceTo" data-name="sourceTo"><input type="hidden" name="sourceTo" size="40" class="wpcf7-form-control wpcf7-hidden wpcf7dtx wpcf7dtx-hidden" aria-invalid="false" autocomplete="off" /></span>   <input class="wpcf7-form-control wpcf7-hidden" value="ECCU-03-07-2021" type="hidden" name="AuthToken" />   <input class="wpcf7-form-control wpcf7-hidden" value="eccu" type="hidden" name="Source" />   <input class="wpcf7-form-control wpcf7-hidden" value="Organic" type="hidden" name="LeadType" />   <input class="wpcf7-form-control wpcf7-hidden" value="ECCU Blog - Website Organic" type="hidden" name="LeadName" />   <input class="wpcf7-form-control wpcf7-hidden" value="ECCU Blog" type="hidden" name="leadSource" /> </div> <div class="form-group col-sm-12">  <input class="wpcf7-form-control wpcf7-submit has-spinner" type="submit" value="Submit" /> </div></div><div class="wpcf7-response-output" aria-hidden="true"></div></form></div></div></section>		</div>	</aside><!-- #sidebar -->			</div><!-- .wf-container -->		</div><!-- .wf-wrap -->		</div><!-- #main -->		<!-- !Footer -->	<footer id="footer" class="footer solid-bg">					<div class="wf-wrap">				<div class="wf-container-footer">					<div class="wf-container">						<section id="text-9" class="widget widget_text wf-cell wf-1-4">			<div class="textwidget"><a href="#" class="bt-logo"><img alt="Footer Logo" src="https://www.eccu.edu/wp-content/uploads/2018/08/ECCU-Logo-new-white.png"></a><ul class="bt-info"><li> <i class="fa fa-map-marker"></i> 101 C Sun Ave NE Albuquerque, NM 87109</li><li> <i class="fa fa-phone"></i> Call Us 505 341 3228</li><li> <i class="fa fa-envelope"></i> Send an Email on <a href="mailto:info@eccu.edu">info@eccu.edu</a></li></ul></div>		</section><section id="text-10" class="widget widget_text wf-cell wf-1-4"><div class="widget-title">Quick Menu</div>			<div class="textwidget"><div class="bt-newsleter-before"><ul><li><i class="fa fa-angle-right"></i> <a href="/accreditation/">Accreditation</a></li><li><i class="fa fa-angle-right"></i> <a href="/about-eccu/administration-faculty/">Faculty</a></li><li><i class="fa fa-angle-right"></i> <a href="/about-eccu/testimonials/">Testimonials</a></li><li><i class="fa fa-angle-right"></i> <a href="/welcome-veterans/">For Veterans</a></li><li><i class="fa fa-angle-right"></i> <a href="https://www.eccu.edu/blog/">Blog</a></li><li><i class="fa fa-angle-right"></i> <a href="/privacy-policy/">Privacy Policy</a></li><li><i class="fa fa-angle-right"></i> <a href="/terms-conditions/">Terms and Conditions</a></li><li><i class="fa fa-angle-right"></i> <a href="/contact-us/">Contact US</a></li><li><i class="fa fa-angle-right"></i> <a href="/sitemap/">Sitemap</a></li></ul></div></div>		</section><section id="text-13" class="widget widget_text wf-cell wf-1-4"><div class="widget-title">Academics</div>			<div class="textwidget"><div class="bt-newsleter-before"><ul><li><i class="fa fa-angle-right"></i> <a href="/student-services/admission/">Admissions</a></li><li><i class="fa fa-angle-right"></i> <a href="/admissions-form/">Admission Application Form</a></li><li><i class="fa fa-angle-right"></i> <a href="https://edm-image.s3.us-west-2.amazonaws.com/ECCU/catalog/EC-Council-University-catalog.pdf" target="_blank" rel="noopener">University Catalog</a></li><li><i class="fa fa-angle-right"></i> <a href="/student-services/school-academic-calendar/">Academic Calendar</a></li><li><i class="fa fa-angle-right"></i> <a href="/academics/online-cyber-security-degrees/">Online Cybersecurity Degrees</a></li><li><i class="fa fa-angle-right"></i> <a href="/academics/bachelor-of-science-in-cyber-security/">Bachelor in Cybersecurity</a></li><li><i class="fa fa-angle-right"></i> <a href="/academics/master-of-science-in-cyber-security/">Master in Cybersecurity</a></li><li><i class="fa fa-angle-right"></i> <a href="/academics/graduate-certificate-program/">Graduate Certificate Programs</a></li><li><i class="fa fa-angle-right"></i> <a href="/academics/non-degree/">Non-degree Certificates</a></li><li><i class="fa fa-angle-right"></i> <a href="/faq/">Faqs</a></li></ul></div></div>		</section><section id="text-20" class="widget widget_text wf-cell wf-1-4"><div class="widget-title">Scholarships</div>			<div class="textwidget"><div class="bt-newsleter-before"><ul><li><i class="fa fa-angle-right"></i><a href="/cyber-challenge/"> Cyber Challenge</a></li><li><i class="fa fa-angle-right"></i><a href="/the-cyber-security-deans-scholarship/"> Dean’s Scholarship</a></li><li><i class="fa fa-angle-right"></i><a href="/the-cybersecurity-heros-scholarship/">Veteran’s Scholarship</a></li><li><i class="fa fa-angle-right"></i><a href="/nm-scholarship/"> New Mexico Scholarship</a></li><li><i class="fa fa-angle-right"></i><a href="/associates-cyber-security-scholarship/"> Associate’s Scholarship</a></li><li><i class="fa fa-angle-right"></i><a href="/women-in-cybersecurity-scholarship/"> Women’s Scholarship</a></li><li><i class="fa fa-angle-right"></i><a href="/foundation-fellowship/"> ECCU Foundation Fellowship</a></li></ul></div></div>		</section>					</div><!-- .wf-container -->				</div><!-- .wf-container-footer -->			</div><!-- .wf-wrap -->			<!-- !Bottom-bar --><div id="bottom-bar" class="solid-bg logo-left" role="contentinfo">    <div class="wf-wrap">        <div class="wf-container-bottom">			                <div class="wf-float-left">					© EC-Council University                </div>			            <div class="wf-float-right">				            </div>        </div><!-- .wf-container-bottom -->    </div><!-- .wf-wrap --></div><!-- #bottom-bar -->	</footer><!-- #footer --><a href="#" class="scroll-top"><svg version="1.1" id="Layer_1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" x="0px" y="0px"	 viewBox="0 0 16 16" style="enable-background:new 0 0 16 16;" xml:space="preserve"><path d="M11.7,6.3l-3-3C8.5,3.1,8.3,3,8,3c0,0,0,0,0,0C7.7,3,7.5,3.1,7.3,3.3l-3,3c-0.4,0.4-0.4,1,0,1.4c0.4,0.4,1,0.4,1.4,0L7,6.4	V12c0,0.6,0.4,1,1,1s1-0.4,1-1V6.4l1.3,1.3c0.4,0.4,1,0.4,1.4,0C11.9,7.5,12,7.3,12,7S11.9,6.5,11.7,6.3z"/></svg><span class="screen-reader-text">Go to Top</span></a></div><!-- #page -->		<script>			window.RS_MODULES = window.RS_MODULES || {};			window.RS_MODULES.modules = window.RS_MODULES.modules || {};			window.RS_MODULES.waiting = window.RS_MODULES.waiting || [];			window.RS_MODULES.defered = true;			window.RS_MODULES.moduleWaiting = window.RS_MODULES.moduleWaiting || {};			window.RS_MODULES.type =