IoT Security Training,  The Internet of Things Security

IoT Security Training covers The Internet of Things security and discusses IoT protocols, potential risks, vulnerabilities, exploitation, data breaches, security framework and mitigation.

IOT security training, Internet of Things (IoT) devices Include: manufacturers, retailers in consumer electronics, healthcare, factory supply chain warehouses, transportation facilities and many others. IoT refers to a networked computing environment that enables devices able to monitor, record and report data, as well as allows users to interact with devices, perform actions remotely or use a stream of useful information when performing tasks.

Learn about risks of unsecured enterprise and home IoT devices connecting to the Internet and able to share the information they generate. topics including device and platform vulnerabilities, authentication and authorization, Web interface and software, transport encryption, management issues, privacy and security enhancements  and other IoT issues observed for various manufacturers across all industry sectors.

Learn about:

  • IoT Principles: The Internet of Things  Overview
  • Principles for Connected Devices
  • IoT Design Principles
  • Principles of IoT Security
  • IoT Attack Areas
  • IoT Vulnerabilities
  • IoT Firmware Analysis
  • IoT Software Weaknesses
  • IoT Security Verification, Validation and Testing
  • IoT Security Assessment on IoT devices
  • Assessing IoT devices attack surfaces
  • Evaluation of IoT device firmware analysis, attack surface, vulnerabilities and exploiting the vulnerabilities

Course Topics Include:

  • Overview and analysis of IoT devices and IoT implementation use cases
  • IoT Architecture
  • IoT Architectural and Design Requirements
  • IoT Security Fundamentals
  • IoT Security Standards
  • NIST Framework: Cyber Physical Systems
  • IoT Governance and Risk Management
  • IoT Security Compliance and Audit
  • IoT Encryption and Key Management
  • IoT Identity and Access Management
    IoT Security Challenges
  • IoT Security in Critical Infrastructure
  • IoT Security in Personal infrastructure
  • IoT Vulnerabilities
  • Wireless Security applied to IoT
  • ZigBee and Bluetooth Security
  • LTE and Mobile Security
  • Cloud-based web interface security
  • Cloud interfaces for XSS, SQLi and CSRF vulnerabilities
    IoT Data Security
  • IoT Platform, Device and Infrastructure Security
  • IoT Management and Operations Security
  • IoT Security Legal and  Compliance
  • TONEX IoT Security Framework
  • Threats to IoT Devices and Implementations
  • Known IoT Cyber Security Threats
  • IoT Security Controls
  • IoT Implementations Security best practices
  • Gaps in IoT Security and technical solutions
  • Procedures and methods for securing the IoT
  • Best practices in securing cloud infrastructure and services supporting the IoT devices and environments
  • IoT Security auditing, identity and access management
  • IoT Authentication, encryption, access control,  privacy, data integrity and risk management
  • IoT Devices Firmware Analysis
  • IoT Attack and Phishing Simulation