This Course is available in the following format:
IoT Security Training – Hands-on
In this IoT Security Training course, you will learn the concepts that underlie the Internet of Things (IoT), enabling technologies, how the various hardware/software components work together to power end-user and infrastructure applications, current and projected future applications, IoT application creation, vulnerabilities created by the IoT, types of security issues and threats posed by the IoT, and techniques for prevention, protection, and remediation.
With the falling costs and increasing capabilities of computer and network hardware and bandwidth, more and more devices are being designed to work with the Internet. Each added device brings security risks for the device user and potentially many other Internet users. This IoT Security Training course examines the new and potentially quite serious IoT security issues that must be addressed by all Internet users.
Audience / Target Group:
The target audience for this IoT Security Training course:
● Aimed at Managers and IT professionals who need to understand the basics of IoT as well as the present and emerging IoT security threats and solutions.
The knowledge and skills that a learner must have before attending this IoT Security Training course are:
● General familiarity with the Internet and IT. Course does not assume engineering background.
Upon completing this IoT Security Training course, learners will be able to meet these objectives:
● What constitutes the IoT
● Visions of IoT
● What is different about the IoT and why it matters
● The creation of IoT applications and security implications
● IoT architectures and related security concerns
● How to address security issues raised by the rapidly growing IoT
IoT Security Training | Internet of Things Security Training – Course Syllabus:
IoT Security Training: What is the Internet of Things (IoT)?
Defining ‘Things’: Hardware, software, data, and services
Why IoT is important
Important IoT terms and trends
Major security risks and issues
Moore’s Law and its implications
What is motivating deployment of the IoT and how will security affect it?
What needs does IoT fill?
The 4th Industrial Revolution
Security and IoT deployment
IoT enabling technologies and associated security vulnerabilities
Cheap and ubiquitous telecommunications and computer hardware
Big Data, Event Stream Processing, Real-Time Analytics
Wireless Sensor Networks (WSNs)
Low power short-range and wide area wireless networks
Automation and Control Systems
Existing and emerging telecom technologies: Li-Fi, LPWAN, LTE-Advanced, 5G, WiFi-Direct, BLE, Low Energy, ZigBee, Z-Wave, Thread, HaLow, etc.
Dealing with security concerns
Emerging security vulnerabilities caused by IoT
The shifting security landscape and how it affects IoT
IoT architecture, implementation and security
Where IoT fits in
Standards and ecosystem
Basic architecture concepts
Types of networks used by IoT
Designing security into IoT
What constitutes a secure system?
What is a reasonable goal?
How much will it cost?
What happens when a new threat emerges?
How do we know if an IoT system is worth the risk?
IoT Security Training: Wrap-up and discussion
How does your organization envision leveraging the IoT?
Your organization’s IoT security concerns