Course Overview:
This course is designed for professionals who want to demonstrate a vendor-neutral, cross-industry skill set in securing IoT ecosystems. It equips participants with the knowledge and practical skills to design, implement, operate, and manage secure IoT environments, addressing security challenges across various industries.
Course Objectives:
- Identify and mitigate security risks in IoT ecosystems.
- Implement secure authentication and authorization measures.
- Protect IoT data through encryption and secure storage techniques.
- Secure IoT networks, including IP, wireless, mobile, and edge networks.
- Address software, firmware, and physical security vulnerabilities.
- Ensure privacy compliance and safeguard sensitive data.
Who Should Attend?
This course is ideal for IoT practitioners, security professionals, network engineers, and system administrators responsible for securing IoT infrastructures, as well as individuals preparing for the CertNexus Certified Internet of Things Security Practitioner (CIoTSP™) certification (Exam ITS-110).
Course Prerequisites
To succeed in this course, participants should have a foundational understanding of IoT ecosystems. This knowledge can be acquired by completing the Certified Internet of Things (IoT) Practitioner (Exam ITP-110) course offered by CertNexus.
Course Content:
MODULE 1: Managing IoT Risks
Topic A: Map the IoT Attack Surface
Topic B: Build in Security by Design
MODULE 2: Securing Web and Cloud Interfaces
Topic A: Identify Threats to IoT Web and Cloud Interfaces
Topic B: Prevent Injection Flaws
Topic C: Prevent Session Management Flaws
Topic D: Prevent Cross-Site Scripting Flaws
Topic E: Prevent Cross-Site Request Forgery Flaws
Topic F: Prevent Unvalidated Redirects and Forwards
MODULE 3: Securing Data
Topic A: Use Cryptography Appropriately
Topic B: Protect Data in Motion
Topic C: Protect Data at Rest
Topic D: Protect Data in Use
MODULE 4: Controlling Access to IoT Resources
Topic A: Identify the Need to Protect IoT Resources
Topic B: Implement Secure Authentication
Topic C: Implement Secure Authorization
Topic D: Implement Security Monitoring on IoT Systems
MODULE 5: Securing IoT Networks
Topic A: Ensure the Security of IP Networks
Topic B: Ensure the Security of Wireless Networks
Topic C: Ensure the Security of Mobile Networks
Topic D: Ensure the Security of IoT Edge Networks
MODULE 6: Ensuring Privacy
Topic A: Improve Data Collection to Reduce Privacy Concerns
Topic B: Protect Sensitive Data
Topic C: Dispose of Sensitive Data
MODULE 7: Managing Software and Firmware Risks
Topic A: Manage General Software Risks
Topic B: Manage Risks Related to Software Installation and Configuration
Topic C: Manage Risks Related to Software Patches and Updates
Topic D: Manage Risks Related to IoT Device Operating Systems and Firmware
MODULE 8: Promoting Physical Security
Topic A: Protect Local Memory and Storage
Topic B: Prevent Physical Port Access