MENUMENU
Generic selectors
Exact matches only
Search in title
Search in content
Search in posts
Search in pages
event
wp-types-group
research-article
testimonial
Filter by Categories
5G TECHNOLOGIES
a) Access Network
All Course Calendar
Archives
b) Core Network
BASIC TRAININGS FOR PROFESSIONALS
BUSINESS & PROJECT MANAGEMENT
Carrier Ethernet Program
CERTIFICATION PROGRAMMES
CYBERSECURITY TRAININGS
DATA ANALYTICS
Demo
FIBER OPTICS COMMUNICATIONS
Forms
INTERNET OF THINGS (IoT)
IP, ETHERNET, MPLS / TRAFFIC ENGINEERING
IPTV, OTT MEDIA TECHNOLOGIES
LTE / 4G TECHNOLOGIES
Member
NETWORK OPERATIONS & SUPPORT
NETWORK QoS & OPTIMIZATION
Old content from Joomla
SDN NFV / DATA CENTRE TECHNOLOGIES
SIP / IMS / ROAMING
Telefocal Certification Programmes
Testimonials
Training Course Calendar
Training Courses
TRANSMISSION TECHNOLOGIES

Internet of Things (IoT) Security Workshop

Duration and Training Format:

3-day instructor-led training

Course Overview

The central role that IoT plays in the technology world and the growth of IoT devices is an undeniable fact.

IoT is bringing the network to our daily lives – our cars, utilities, homes etc, and extending its reach to cities, industries and more.

With such influence, IoT security is definitely a key concern for the entire industry of IoT stakeholders, spanning developers, service providers, customers, and end-users.

This course outlines the state-of-the-art prevailing practices for IoT Security and explains how this topic is evolving.

Course Objectives:

At the end of the course, participants will:

  • Understand the security threat landscape and how to take preventive measures
  • Understand the top ten security issues revolving around IoT
  • Learn about the Secure Development Lifecycle (SDL) of IoT products
  • Gain knowledge on the security consideration regarding verticals of connected devices
  • Learn from real-life examples and case studies in IoT Security

Target Audience

This course is intended for IoT developers and managers, vendors and customers alike and for them to make strategic decisions for their IoT products.

Course Outline:

  • Module 1: Understanding IoT System Risks & Challenges
  • Module 2: OWASP 2017 – Top 10 Security Risks and Consumer IoT Security Guidance
  • Module 3: Understanding Challenges of IoT security
  • Module 4: Recent Case Studies of IoT Hacking
  • Module 5: Security issues in Industrial Internet of Thing (IIOT)
  • Module 6: Security issues in Medical/Health care IoT system
  • Module 7: Security issues in Connected Cars
  • Module 8: IoT Security Implementation Case Study & Prevailing Art from Known IoT Platform
  • Module 9: Legal Issues in Different Verticals of IoT
  • Module 10: Blockchain & IoT Security
  • Module 11: IoT Security & Standards
  • Module 12: Active areas of IoT security research, future & Q/A session

Related Course Topics

An Overview of Cyber Security Course Objectives: After attending this "An Overview of Cyber Security" training, participants will be able to: Describe the principal types of security threat which individual computer users, governments, SMEs and large corporations ar...
Cyber Fundamentals Training with Hands-On Labs Course Overview: The main objectives of this course is to address some fundamentals of Cyber Security topics, and provide insights into the modern security environment. It seeks to explain the cyber threat landscape and attackers' mentality, in...
LTE Security Course Overview: This "LTE Security" course is designed to enable participants understand the security issues surrounding LTE networks. It will list and explain in-depth the various encryption algorithms used in LTE networks so that the participants...
Mobile Network Vulnerabilities & Pentesting Course Objectives: This workshop aims at introducing penetration testing methods and principles for Sigtran/MAP-based signaling systems in mobile networks. During the course participant will gain insight into the signaling protocol related networ...
Practical Masterclass – Cyber Security Fundamentals Duration and Training Format 4 Days with Practical Hands-on sessions Course Overview: This course provides insights into the modern day security environment and the attacker’s state of mind, including how attackers work, what tools they use, what ...

COURSE ENQUIRY

Telefocal Asia Pte Ltd © www.telefocal.com. All rights reserved. Website Terms & Conditions

Setup Menus in Admin Panel