Internet of Things Security

Internet of Things digital concept

The Internet of Things (IoT) is bringing the network to individuals’ daily lives and is extending its reach to cities, industries and more. As the proliferation of connected devices continues to surge, securing these systems becomes increasingly critical for all IoT stakeholders which include developers, service providers, customers, and end-users.

This course is designed to provide a comprehensive understanding of the security aspects surrounding IoT. It delves into the essential components, challenges, and solutions in IoT security, offering participants both theoretical knowledge and practical insights through real-life case studies and examples.

  • Cyber Security Professionals
  • Network Administrators
  • IoT Developers and Managers
  • IoT Product Managers and Owners
  • IoT Vendors and Customers
Instructor-Led Training
  • Classroom: 3 days
  • LIVE Virtual*: 21 hours
  • A minimum of 6 or more participants are required for a company-based LIVE Virtual course to commence
  • LIVE Virtual courses can be conducted for 5 hours or 7 hours daily. Please note that the number of training days will be extended if you opt for 5 hours daily.

5 – 7 Aug 2024 (Mon – Wed), GMT +08:00
If you are keen on attending this course, please register your interest via our course enquiry form

At the end of the course, participants will be able to:

  • Understand the security threat landscape and how to take preventive measures
  • Recognize and assess the unique risks and challenges associated with IoT systems
  • Utilize the OWASP Top 10 security risks and best practices to mitigate common vulnerabilities in IoT devices
  • Apply frameworks and guidelines provided by the IoT Security Foundation and other relevant bodies
  • Understand and address legal and regulatory issues in various IoT verticals
  • Familiarize themselves with IoT standards and the landscape of standards development organizations (SDOs)
  • Draw practical insights from real-life case studies on connected cars and electric car chargers, applying lessons learned to other IoT contexts
  • Keep abreast of active research areas and future trends in IoT security, adapting to emerging threats and technologies
  1. IoT Architecture from the Security Perspective
  • IoT Features
  • IoT Ecosystem
  • IoT Security Triad
  1. Usual Security Measures
  • IoT Technology Stack
  • IoT Decision Area
  • CIA Triad
  1. IoT System Risks and Challenges
  • Risk Mitigation
  • Software and Hardware Hardening
  • Security Challenges
  1. OWASP – Top 10 Security Risks and Consumer IoT Security Guidance
  • NIST Framework
  • Risk and Mitigation
  • Case Study
  1. Understanding the Challenges of IoT Security
  • Types of Malwares
  • Human – The Weakest Point
  • Prevention
  1. Basics of Cryptography
  • Types of Cryptography
  • 5 IoT Epic Fails
  • Overcoming Challenges
  1. IoT Security Foundation
  • IoT Security Challenges
  • IoT CPS Mandate
  • IoT Security Foundation (IoTSF)
  • IoTSF Framework
  1. IoT Security in 4G and 5G
  • IoT 5G Application
  • IoT 5G Threats
  • IoT Solution
  1. IoT Security Domains
  • EndPoint Security
  • Operations security
  • Network Security
  • Cloud Security
  1. Detect Dimensions
  • Communications to Malicious Sites
  • Learned Patterns from Malwares and Botnets
  • Deviation from Expected IoT Traffic Profiles
  1. Botnet Spread and Attack
  • IoT Security Domains
  • Actual Case and Scenario
  • MITM (Man in the Middle)
  • OpSec
  1. Legal Issues in Different Verticals of IoT
  • HIPAA (Health Insurance Portability and Accountability Act)
  • GDPR (General Data Protection Regulation)
  • PIPEDA (Personal Information Protection and Electronic Documents Act)
  1. Blockchain and IoT Security
  • Big Data (Hadoop/Hive)
  • Spark
  • Hardware and software
  • Technology
  1. IoT SDOs and Alliances Landscape
  • AIOTi WG3
  • Ethics
  • Rules and Regulation
  • Privacy Framework
  1. IoT Security and Standards
  • Vulnerabilities Assessment
  • Penetration Testing
  • Technology and Applications
  1. Example: Connected Cars Security
  1. Example: Electric Car Chargers
  1. Active Areas of IoT Security Research, Future of IoT

Note: A Certificate of Completion will only be issued upon achieving at least 75% attendance for the course.

Be the first to add a review.

Please, login to leave a review
Enrolled: 0 students

Upcoming Classes

You cannot copy content of this page