Description
WHOM IS IT APPLICABLE
- Software Engineers
- Application Developers
- IT Architects
- System Administrators
WHAT YOU WILL LEARN
After completing this course, you will be able to:
- Explain IoT and its role in enterprises
- Understand IoT system vulnerabilities, threats and their countermeasures
- Interpret IoT security architecture and security lifecycle
- Employ cryptography solutions for the IoT device security
- Perform penetration testing on IoT devices
- IoT mobile and web applications
- Demonstrate how to exploit IoT web and mobile apps
MODULE OVERVIEW
Module 1: Introduction to IoT in the Enterprise
Module 2: Exploring Vulnerabilities, Attacks and Countermeasures in IoT
Module 3: Securing the IoT and Its Security Architecture
Module 4: Exploring IoT Security Lifecycle
Module 5: Exploring Threat Modelling in IoT
Module 6: Exploring Security Requirements and Existing Security Techniques
Module 7: Implementing Cryptography in IoT Security
Module 8: Applying Identity and Access Management Solutions for the IoT
Module 9: Implementing Cloud Security for the IoT
Module 10: Maintaining a Compliance Monitoring Program for the IoT
Module 11: Exploring IoT Penetration Testing
Module 12: Exploiting Web Applications of IoT
Module 13: Exploiting Mobile Applications of IoT
PREREQUISITES
- IT professionals and anyone who is interested in Internet of Things Security and must have basic knowledge about the IoT or two years working experience in the IoT domain.