Generic selectors
Exact matches only
Search in title
Search in content
Search in posts
Search in pages
event
wp-types-group
research-article
testimonial
Filter by Categories
a) Access Network
All Course Calendar
Archives
b) Core Network
Basic Courses for Professionals
Business Analytics & Management
c) Certified Technicians
Carrier Ethernet Program
Cloud-Enabling Technologies
Demo
Fiber Optics Communication Technologies Courses
Forms
Internet of Things (IoT)
IP / Traffic Engeering / Signaling
LTE / 4G / 5G Technologies
Member
Network QoS & Optimization
Security Courses
Telefocal Certification Programmes
Training Course Calendar
Training Courses
Transmission Technologies

Internet of Things (IoT) Security Workshop

Course Objectives:

At the end of the course, participants will:

  • Understanding the security threat landscape and how to take preventive action
  • Understand the top ten security issues revolving around IoT
  • Learn about the Secure Development Lifecycle (SDL) of IoT products
  • Gain knowledge on the security considerations regarding verticals of connected devices
  • Learn from real-life examples and case studies in IoT Security

Course Overview:

The growth and central role of the Internet of Things in the technology world is already a fact. The IoT is bringing the network to the real physical aspects of our lives: our cars, utlities, homes, cities, industries and more…

With such influence, IoT security is definitely the main concern for the whole industry of IoT stakeholders, from developers, to service providers, customers and end users.

IoT security training workshop is aimed at this challenge, with a focus on bringing IoT security basics to IoT professionals.

The workshop will allow managers, planners and developers have a wider understanding of the IoT security landscape and will give participants the tools and knowledge to develop and supply IoT security solutions.

IoT – Top Ten Security Issues
Discover and learn the IoT top ten security issues, defined by the OWASP organization. Including real examples and recommended mitigations. The top ten includes the cloud side (API and web interface), the client side (mobile / physical security) and general concerns (privacy, transport layer encryption etc.)

SDL (Secure Development Lifecycle) in IoT Products
Security assurance for delivered devices and patching management opened a new area for the SDL world. Find out new Tips & Tricks for SDL implementation in IoT products. Secure lifecycle is the first step in keeping the product optimally secure. Besides that, in delivered devices, fixing vulnerabilities is much more expensive and sometimes almost impossible.

Security Architecture in IoT
Secure architecture is not just the solutions for known issues, it is also how to plant a smart basis to allow future security upgrades. Learn about security considerations such as implementing device ID initialization, encryption, pairing and load distribution between the end-devices, mobile and the cloud.

Legal Issues in IoT Products
Smart connected devices are shipped all over the world. Learn about legal issues on topics such as privacy and working inside client’s network. Knowing the legal considerations in advance saves a lot of time later, and also might be the thin line between a successful product and a huge lawsuit.

Security Consideration of Verticals
The connected device world is so wide, there are different problems for different verticals, and different approaches to handling the same problem depending on the vertical.
Every vertical has its unique set of security challenges and the optimal solution suitable to its vertical.

Find out other topics that are relevant to your industry, and learn how professionals in other industries solve similar problems.

Case Studies in IoT Security
Hear the issues, considerations, mitigations and a life-story of an IoT product from one of companies in the industry. The requirements of the different teams, including product management and the security advisors.

A case study is a chance to hear end to end, the whole product story, problems, doubts and successful decisions.

Related Course Topics

An Overview of Cyber Security "This course allows me to fully appreciate the risks that Cyber Security presents. " ~ Wee K, SINGTEL Course Objectives: After attending the training, participants will be able to: Describe the principal types of s...
LTE Security Course Overview: This "LTE Security" course is designed to enable participants understand the security issues surrounding LTE networks. It will list and explain in-depth the various encryption algorithms used in LTE networks so that the participants...
Cyber Security with Hands-on Simulation Introduction The Threats and the Challenge All aspects of our lives, economic strength, Homeland Security and national infrastructure heavily depend on a stable, safe and strong cyberspace Cyber-attacks come in many different forms, threats ...

COURSE ENQUIRY

Telefocal Asia Pte Ltd © www.telefocal.com. All rights reserved. Website Terms & Conditions

Setup Menus in Admin Panel