Certified Internet of Things Security Practitioner (CloTSP™)

Course Fee:

Resources
Related Course

Certified Internet of Things Security Practitioner (CloTSP™)

Course Overview:

This course is designed for professionals who want to demonstrate a vendor-neutral, cross-industry skill set in securing IoT ecosystems. It equips participants with the knowledge and practical skills to design, implement, operate, and manage secure IoT environments, addressing security challenges across various industries.

Course Objectives:

  • Identify and mitigate security risks in IoT ecosystems.
  • Implement secure authentication and authorization measures.
  • Protect IoT data through encryption and secure storage techniques.
  • Secure IoT networks, including IP, wireless, mobile, and edge networks.
  • Address software, firmware, and physical security vulnerabilities.
  • Ensure privacy compliance and safeguard sensitive data.

Who Should Attend?

This course is ideal for IoT practitioners, security professionals, network engineers, and system administrators responsible for securing IoT infrastructures, as well as individuals preparing for the CertNexus Certified Internet of Things Security Practitioner (CIoTSP™) certification (Exam ITS-110).

Course Prerequisites

To succeed in this course, participants should have a foundational understanding of IoT ecosystems. This knowledge can be acquired by completing the Certified Internet of Things (IoT) Practitioner (Exam ITP-110) course offered by CertNexus.

Course Content:

MODULE 1: Managing IoT Risks
Topic A: Map the IoT Attack Surface
Topic B: Build in Security by Design

MODULE 2: Securing Web and Cloud Interfaces
Topic A: Identify Threats to IoT Web and Cloud Interfaces
Topic B: Prevent Injection Flaws
Topic C: Prevent Session Management Flaws
Topic D: Prevent Cross-Site Scripting Flaws
Topic E: Prevent Cross-Site Request Forgery Flaws
Topic F: Prevent Unvalidated Redirects and Forwards

MODULE 3: Securing Data
Topic A: Use Cryptography Appropriately
Topic B: Protect Data in Motion
Topic C: Protect Data at Rest
Topic D: Protect Data in Use

MODULE 4: Controlling Access to IoT Resources
Topic A: Identify the Need to Protect IoT Resources
Topic B: Implement Secure Authentication
Topic C: Implement Secure Authorization
Topic D: Implement Security Monitoring on IoT Systems

MODULE 5: Securing IoT Networks
Topic A: Ensure the Security of IP Networks
Topic B: Ensure the Security of Wireless Networks
Topic C: Ensure the Security of Mobile Networks
Topic D: Ensure the Security of IoT Edge Networks

MODULE 6: Ensuring Privacy
Topic A: Improve Data Collection to Reduce Privacy Concerns
Topic B: Protect Sensitive Data
Topic C: Dispose of Sensitive Data

MODULE 7: Managing Software and Firmware Risks
Topic A: Manage General Software Risks
Topic B: Manage Risks Related to Software Installation and Configuration
Topic C: Manage Risks Related to Software Patches and Updates
Topic D: Manage Risks Related to IoT Device Operating Systems and Firmware

MODULE 8: Promoting Physical Security
Topic A: Protect Local Memory and Storage
Topic B: Prevent Physical Port Access

Related Course

What Hands-On learning experience can we assist you today?

Please tick here if you agree to receive updates about the latest news & offers which we feel may be of interest to you. We will process your data in accordance with our Privacy Policy. You may withdraw this consent at any time. We never sell or distribute your data.