Certified IoT Security Silver

Introduction

The ability to connect, communicate with, and remotely manage an incalculable number of networked, automated devices (approximately 26 Billion by 2020) via the Internet is becoming pervasive, from the factory floor to the hospital operating room to the residential basement. The transition from closed networks to enterprise IT networks to the public Internet is accelerating at an alarming pace—and justly raising alarms about security. As we become increasingly reliant on intelligent, interconnected devices in every aspect of our lives, how do we protect potentially billions of them from intrusions and interference that could compromise personal privacy or threaten public safety?

This training covers the basics and Intermediate levels of IoT landscape and takes you through IoT Security Challenges and vulnerabilities and teaches you the steps to hack and harden the IoT devices, applications and ecosystem.


Training Approach

The training would involve both theory and practical led by the instructor. Easy to understand case study-based real-life approach. In depth knowledge from experienced trainer.


Who Should Attend?

This course is recommended for IoT Enthusiasts, IoT Designers, IoT Developers, IoT Implementers, IT Managers, IT Auditors and anyone who is ready to master the steps required to secure IOT Implementations.


Prerequisites

  1. Should be involved in the IT field.
  2. Should be familiar with using Windows, Linux and VMWare.
  3. Should understand programming concepts, but programming experience is not mandatory.
  4. Background knowledge in reverse code engineering and vulnerability assessment will be helpful, but not required.
  5. Enthusiasm is a must.

Duration

4 days


Course Outline

The following is the outline of the course:

Overview of IOT technologies

  • What is IoT?
  • IoT Architecture & Ecosystem
  • Hardware & Software Platforms
  • Communication Channels & Protocols
  • Cloud & IoT
    • Cloud & RESTful Web Services
  • Data Streaming & IoT
  • IoT Myths
  • IoT Applications
    • Agriculture
    • Medical
    • Meteorology

IoT Vulnerabilities

  • Insecure Web Interface
  • Insufficient Authentication/Authorization
  • Insecure Network Services
  • Lack of Transport Encryption
  • Privacy concerns
  • Insecure Cloud Interface
  • Insecure Mobile Interface
  • Insufficient Security Configurability
  • Insecure Software/Firmware
  • Poor Physical Security

IoT Security Overview

  • Overview of IOT Security
  • IoT Threats
  • Challenges to Secure IoT Deployments
  • Types of IoT Attacks

IoT Endpoint Security Guidelines

  • IoT Endpoint Security Challenges
  • IoT Endpoint Security Model and Recommendations
  • Secure the IoT Systems
  • Securing the IoT Network
  • IPv4 Based Security Guidelines
  • IPv6 Based Security Guidelines
  • Data Link Layer Based Network Guidelines

Baseline Policies for IoT Security

  • IoT Security Controls Lifecyle
  • Authentication / Authorization
  • Logging & Audit Framework
  • Privacy by Design
  • Data Protection Policies

Hands On Lab

  • IoT Lab installation (install Kali Linux, install required tools)
  • IoT OS (Windows) security test
  • IoT OS (Linux) security test
  • WiFi for IoT security test
  • Bluetooth for IoT security test
  • IoT vulnerability search engine

IoT Security Recommendations

  • High Priority Security Recommendations
  • Medium Priority Recommendations
  • Low Priority Recommendations
  • 5G based IoT Endpoint Security Recommendations

Disclaimer : Course contents are subject to change without prior notice