Location
-
Format
What’s this? Ways to train
Classroom
Live, instructor-led training in a standard, professional classroom environmentVirtual
Live, instructor-led training conducted over the internet, with hands-on labsOnline
An online, HTML5, self-paced learning experience available for all coursesOn-site
Private training for your entire team, delivered at your location, a training center, or onlineVideo classroom
Learn more about our training formats
High-definition video of our most popular courses, streamed to your laptop or personal device
-
4 Days
-
All of our private classes are customized to your organization's needs.
-
Click on the button below to send us your details and you will be contacted shortly.
Already purchased this offering? Log in
Request more information
Inquiry for: Myself My Company
By providing your contact details, you agree to our Privacy Policy
Thank You
Our learning consultant will get back to you in 1 business day
Certified Internet Security Technologist
WHAT YOU WILL LEARN
With the emergence of sensors technology and the advances in communication technologies and cloud computing, we are moving towards a new computing paradigm, which will involve trillions of connected devices – IoT, Internet of Things. IoT will transform and it requires rethinking of how we compute today. According to a report by Gartner, IoT will include 26 billion units installed by 2020, and by that time, IoT product and service suppliers will generate incremental revenue exceeding $300 billion, mostly in services. However, it is becoming an increasingly attractive target for cybercriminals. More connected devices mean more attack vectors and more possibilities for hackers to target us.; A number of unethical activities including monitoring live feeds, changing camera settings and authorizing other users to remotely view and control the monitor is leveraged by attackers in these inter-connected IoT devices network .Wearables also can become a source of threat to your privacy, as hackers can use the motion sensors embedded in smartwatches to steal information you’re typing, or they can gather health data from smartwatch apps or health tracker devices you might be using.
AUDIENCE
Participants are recommended to have basic understanding of networking and programming background.
METHODOLOGY
This program will be conducted with interactive lectures, PowerPoint presentation, discussion and practical exercise.
COURSE OBJECTIVES
• Understand the concepts of Internet security, its vulnerabilities, relationship between the Internet with the inter-connected sensors aka IoT and the security loss impact on business & government organizations.
• Explore various case study and its solutions based on different security attacks in accordance to the various components, architecture of IoT and security protocols.
• Analyze and explore the security and privacy challenges in IoT.
Modules

Dr.Selvakumar Manickam
He is well known for her highly charged, energetic and power-packed training sessions. Selvakumar also holds many other portfolios in addition to be an affluent trainer. He has authored and co-authored more than 140 articles in journals, conference proceedings and book reviews. He has graduated 9 PhDs. He has successfully completed many research grants and industrial projects. He has given several keynote speeches as well as dozens of invited lectures and workshops at conferences, international universities and for industry. He also lectures in various Computer Science and IT courses which includes development of new courseware in tandem with current technology trend. He also codes in Android, Java, .net, C, PHP and Python in relation to the R&D work that he carried out. Read More
Course Reviews
0
0 Ratings