The ability to connect, communicate with, and remotely manage an incalculable number of networked, automated devices (approximately 26 Billion by 2020) via the Internet is becoming pervasive, from the factory floor to the hospital operating room to the residential basement. The transition from closed networks to enterprise IT networks to the public Internet is accelerating at an alarming pace—and justly raising alarms about security. As we become increasingly reliant on intelligent, interconnected devices in every aspect of our lives, how do we protect potentially billions of them from intrusions and interference that could compromise personal privacy or threaten public safety?
This training covers the basics and Intermediate levels of IoT landscape and takes you through IoT Security Challenges and vulnerabilities and teaches you the steps to hack and harden the IoT devices, applications and ecosystem.
The training would involve both theory and practical led by the instructor. Easy to understand case study-based real-life approach. In depth knowledge from experienced trainer.
Who Should Attend?
This course is recommended for IoT Enthusiasts, IoT Designers, IoT Developers, IoT Implementers, IT Managers, IT Auditors and anyone who is ready to master the steps required to secure IOT Implementations.
1. Should be involved in the IT field.
2. Should be familiar with using Windows, Linux and VMWare.
3. Should understand programming concepts, but programming experience is not mandatory.
4. Background knowledge in reverse code engineering and vulnerability assessment will be helpful, but not required.
5. Enthusiasm is a must.
Overview of IOT technologies
What is IoT?
IoT Architecture & Ecosystem
Hardware & Software Platforms
Communication Channels & Protocols
Cloud & IoT
Cloud & RESTful Web Services
Data Streaming & IoT
IoT Security Overview
Overview of IOT Security
Challenges to Secure IoT Deployments
Types of IoT Attacks
Baseline Policies for IoT Security
IoT Security Controls Lifecyle
Authentication / Authorization
Logging & Audit Framework
Privacy by Design
Data Protection Policies
IoT Security Recommendations
High Priority Security Recommendations
Medium Priority Recommendations
Low Priority Recommendations
5G based IoT Endpoint Security Recommendations
Insecure Web Interface
Insecure Network Services
Lack of Transport Encryption
Insecure Cloud Interface
Insecure Mobile Interface
Insufficient Security Configurability
Poor Physical Security
IoT Endpoint Security Guidelines
IoT Endpoint Security Challenges
IoT Endpoint Security Model and Recommendations.
Secure the IoT Systems
Securing the IoT Network.
IPv4 Based Security Guidelines
IPv6 Based Security Guidelines
Data Link Layer Based Network Guidelines
Hands On Lab
IoT Lab installation (install Kali Linux, install required tools)
IoT OS (Windows) security test
IoT OS (Linux) security test
WiFi for IoT security test
Bluetooth for IoT security test
IoT vulnerability search engine
Disclaimer : Course contents are subject to change without prior notice