Certified IOT Security Professional | IT Training & Certification | Info Trek
Respect Your Dreams
Follow through on your goals with courses

Certified IOT Security Professional


Format What’s this?
  1. 2 Days
  1. All of our private classes are customized to your organization's needs.
  2. Click on the button below to send us your details and you will be contacted shortly.
Request more information

Inquiry for: Myself    My Company

By providing your contact details, you agree to our Privacy Policy




Thank You

Our learning consultant will get back to you in 1 business day

Certified IOT Security Professional


The ability to connect, communicate with, and remotely manage an incalculable number of networked, automated devices (approximately 26 Billion by 2020) via the Internet is becoming pervasive, from the factory floor to the hospital operating room to the residential basement.

The transition from closed networks to enterprise IT networks to the public Internet is accelerating at an alarming pace—and justly raising alarms about security. As we become increasingly reliant on intelligent, interconnected devices in every aspect of our lives, how do we protect potentially billions of them from intrusions and interference that could compromise personal privacy or threaten public safety?

This workshop covers the basics of IoT landscape and takes you thru on the Security Challenges and vulnerabilities and teaches you the steps to hack and harden the IoT devices, applications and ecosystem.


IoT Enthusiasts, IoT Designers, IoT Developers, IoT Implementers, IT Managers, IT Auditors and anyone who is ready to master the steps required to secure IOT Implementations.


This program will be conducted with interactive lectures, PowerPoint presentations, discussions and practical exercises

Expand All


Module 1 : IoT an Overview

• What is IoT ?

• IoT Architecture & Ecosystem
• 6 sides of IoT Puzzle
• Hardware & Software Platforms
• Communication Channels & Protocols
• Cloud & IoT
• Data Streaming & IoT
• Data Store & IoT
• What is Sensor & Actuator ?
• Sensor Types & Properties
• Cloud & RESTful Web Services
• IoT Myths
• IoT Applications

Module 2 : IoT Security

• IoT Threats

• Challenges to Secure IoT Deployments

• IoT Attack Surface Areas

• CSA IoT Security Controls

o Privacy by Design

o Secure Systems Engineering

o Layered Security Protection

o Data Protection

o IoT Security Controls Lifecyle

o Authentication / Authorization

o Logging & Audit Framework

Module 3 : OWASP Top 10 IoT Vulnerabilities

• Insecure Web Interface

• Insufficient Authentication/Authorization

• Insecure Network Services

• Lack of Transport Encryption

• Privacy concerns

• Insecure Cloud Interface

• Insecure Mobile Interface

• Insufficient Security Configurability

• Insecure Software/Firmware

• Poor Physical Security

Module 4 : Hacking IoT Devices – Case Studies

• Hacking IoT Baby Monitors

• Hacking Smart Watches

• Hacking Wireless Lightbulbs

Module 5 : IoT Endpoint Security

• Intro to GSM IoT Endpoint Security Guidelines

• IoT Endpoint Security Challenges

• IoT Endpoint Security Model

• IoT Endpoint Security Recommendations

o Critical Security Recommendations

o High Priority Security Recommendations

o Medium Priority Recommendations

o Low Priority Recommendations

Clement Arul

Clement Arul

A professional who believes that adaptability of security is directly equal to the affordability of security products, services and trainings. Started creating security products, services and trainings and certifications that are affordable as well as be part of the team in creation Nation Cyber Security Frameworks.Clement is also a two-time recipient award of National Award from Govt of Malaysia: Cyber Security Professional of the Year in 2017 and 2014 as well as a three-time Regional Award winner of Cyber Security Professional of the Year Asia and APAC in 2020, 2019 and 2017. He was also awarded as APAC Cyber Security Educator of the Year in 2020 and 2019. Read More

Course Reviews

No Remarks


0 Ratings