Course Details
Course Outline
1 - Managing IoT Risks
Map the IoT Attack SurfaceBuild in Security by Design
2 - Securing Web and Cloud Interfaces
Identify Threats to IoT Web and Cloud InterfacesPrevent Injection FlawsPrevent Session Management FlawsPrevent Cross-Site Scripting FlawsPrevent Cross-Site Request Forgery FlawsPrevent Unvalidated Redirects and Forwards
3 - Securing Data
Use Cryptography AppropriatelyProtect Data in MotionProtect Data at RestProtect Data in Use
4 - Controlling Access to IoT Resources
Identify the Need to Protect IoT Implement Secure AuthenticationImplement Secure AuthorizationImplement Security Monitoring on IoT Systems
5 - Securing IoT Networks
Ensure the Security of IP NetworksEnsure the Security of Wireless NetworksEnsure the Security of Mobile NetworksEnsure the Security of IoT Edge Networks
6 - Ensuring Privacy
Improve Data Collection to Reduce Privacy ConcernsProtect Sensitive DataDispose of Sensitive Data
7 - Managing Software and Firmware Risks
Manage General Software RisksManage Risks Related to Software Installation and ConfigurationManage Risks Related to Software Patches and UpdatesManage Risks Related to IoT Device Operating Systems and Firmware
8 - Promoting Physical Security
Protect Local Memory and StoragePrevent Physical Port Access
Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Who is it For?
Target Audience
This course is designed for IoT practitioners who are looking to improve their skills and knowledge of IoT security and privacy. This course is also designed for students who are seeking the CertNexus Certified Internet of Things Security Practitioner (CIoTSP) certification and who want to prepare for Exam ITS-110.
Prerequisites
Other Prerequisites
To ensure your success in this course you should have a fundamental understanding of IoT ecosystems