Menu

Clement

  • 8 hours of Live Online / Virtual Training
  • E-WorkBook
  • E-Cert

Course Objectives

  • This workshop covers the basics of IoT landscape and takes you thru on the Security Challenges and vulnerabilities and teaches you the steps to hack and harden the IoT devices, applications and ecosystem.

Audience

  • IoT Enthusiasts, IoT Designers, IoT Developers, IoT Implementers, IT Managers, IT Auditors and anyone who is ready to master the steps required to secure IOT Implementations.

Methodology

This program will be conducted with interactive lectures, PowerPoint presentation, discussions and practical exercise

Course Modules

  • Module 1 : IoT an Overview
    – What is IoT ?
    – IoT Architecture & Ecosystem
    – 6 sides of IoT Puzzle
    – Hardware & Software Platforms
    – Communication Channels & Protocols
    – Cloud & IoT
    – Data Streaming & IoT
    – Data Store & IoT
    – What is Sensor & Actuator ?
    – Sensor Types & Properties
    – Cloud & RESTful Web Services
    – IoT Myths
    – IoT Applications
  • Module 2 : IoT Security

    – IoT Threats
    – Challenges to Secure IoT Deployments
    – IoT Attack Surface Areas
    – CSA IoT Security Controls
    – Privacy by Design
    – Secure Systems Engineering
    – Layered Security Protection
    – Data Protection
    – IoT Security Controls Lifecyle
    – Authentication / Authorization
    – Logging & Audit Framework

  • Module 3 : OWASP Top 10 IoT Vulnerabilities
    – Insecure Web Interface
    – Insufficient Authentication/Authorization
    – Insecure Network Services
    – Lack of Transport Encryption
    – Privacy concerns
    – Insecure Cloud Interface
    – Insecure Mobile Interface
    – Insufficient Security Configurability
    – Insecure Software/Firmware
    – Poor Physical Security
  • Module 4 : Hacking IoT Devices – Case Studies
    – Hacking IoT Baby Monitors
    – Hacking Smart Watches
    – Hacking Wireless Lightbulbs
  • Module 5 : IoT Endpoint Security
    – Intro to GSM IoT Endpoint Security Guidelines
    – IoT Endpoint Security Challenges
    – IoT Endpoint Security Model
    – IoT Endpoint Security Recommendations
    – Critical Security Recommendations
    – High Priority Security Recommendations
    – Medium Priority Recommendations
    – Low Priority Recommendations

Contact us for more information

LOGIN

Login with your social account

or

Don’t have an account with us?

Edit Profile

FREE FOR LIFE

Sign Up to Bookmark your Favourite Course
or Request for a Quotation instantly

Sign in with your social account

or

By signing up, you agree to our Terms of Use and Privacy Policy

Have an account with us already?