Location
-
Format
What’s this? Ways to train
Classroom
Live, instructor-led training in a standard, professional classroom environmentVirtual
Live, instructor-led training conducted over the internet, with hands-on labsOnline
An online, HTML5, self-paced learning experience available for all coursesOn-site
Private training for your entire team, delivered at your location, a training center, or onlineVideo classroom
Learn more about our training formats
High-definition video of our most popular courses, streamed to your laptop or personal device
-
2 Days
-
All of our private classes are customized to your organization's needs.
-
Click on the button below to send us your details and you will be contacted shortly.
Already purchased this offering? Log in
Request more information
Inquiry for: Myself My Company
By providing your contact details, you agree to our Privacy Policy
Thank You
Our learning consultant will get back to you in 1 business day
Certified IOT Security Professional
WHAT YOU WILL LEARN
The ability to connect, communicate with, and remotely manage an incalculable number of networked, automated devices (approximately 26 Billion by 2020) via the Internet is becoming pervasive, from the factory floor to the hospital operating room to the residential basement.
AUDIENCE
IoT Enthusiasts, IoT Designers, IoT Developers, IoT Implementers, IT Managers, IT Auditors and anyone who is ready to master the steps required to secure IOT Implementations.
METHODOLOGY
This program will be conducted with interactive lectures, PowerPoint presentations, discussions and practical exercises
Modules
• What is IoT ?
• IoT Threats
• Challenges to Secure IoT Deployments
• IoT Attack Surface Areas
• CSA IoT Security Controls
o Privacy by Design
o Secure Systems Engineering
o Layered Security Protection
o Data Protection
o IoT Security Controls Lifecyle
o Authentication / Authorization
o Logging & Audit Framework
• Insecure Web Interface
• Insufficient Authentication/Authorization
• Insecure Network Services
• Lack of Transport Encryption
• Privacy concerns
• Insecure Cloud Interface
• Insecure Mobile Interface
• Insufficient Security Configurability
• Insecure Software/Firmware
• Poor Physical Security
• Hacking IoT Baby Monitors
• Hacking Smart Watches
• Hacking Wireless Lightbulbs
• Intro to GSM IoT Endpoint Security Guidelines
• IoT Endpoint Security Challenges
• IoT Endpoint Security Model
• IoT Endpoint Security Recommendations
o Critical Security Recommendations
o High Priority Security Recommendations
o Medium Priority Recommendations
o Low Priority Recommendations

Clement Arul
A professional who believes that adaptability of security is directly equal to the affordability of security products, services and trainings. Started creating security products, services and trainings and certifications that are affordable as well as be part of the team in creation Nation Cyber Security Frameworks.Clement is also a two-time recipient award of National Award from Govt of Malaysia: Cyber Security Professional of the Year in 2017 and 2014 as well as a three-time Regional Award winner of Cyber Security Professional of the Year Asia and APAC in 2020, 2019 and 2017. He was also awarded as APAC Cyber Security Educator of the Year in 2020 and 2019. Read More
Course Reviews
0
0 Ratings