Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
Preparing the Development Environment
- Device, development tools, SDK
IoT Security Services
- AWS IoT
- Google Cloud IoT Core
- Microsoft Azure Sphere
Planning an IoT Application
- Deciding Application Features
- Types of Device: Sensors, LCD Screens, Buzzers, etc.
- Certified vs Non-Certified IoT Devices
Anatomy of an IoT Device
- Microcontroller, Sensor, Battery, etc.
The IoT Ecosystem
- An architectural overview
- Cloud server security
- Device security
- Application security
Case Studies: Hacking a Home's Temperature Sensor.
IoT Security Lifecycle
- Security engineering processes
- OWASP Internet of Things (IoT) Project
Designing a Secure IoT Application
- Secure Communications (HTTPS, TLS/SSL, etc.)
- Data Integrity (Encryption, Hashing, etc.)
- Identity and Access Management
Scaling an Application
- Fault Tolerance
Integration IoT Devices into Existing Security Infrastructure
- Extending existing systems
Deploying an IoT Application
- Monitoring the Application
- Testing the security of the application
Assessment
- IoT Privacy Impact Assessment (PIA)
- Safety Impact Assessment
Troubleshooting
Summary and Conclusion
Requirements
- An understanding of networking principles.
- Programming experience in any language.
- A cloud provider account.
Audience
- Developers
- Security professionals
- IoT architects
21 Hours
Testimonials (2)
The ability of the trainer to align the course with the requirements of the organization other than just providing the course for the sake of delivering it.
Masilonyane - Revenue Services Lesotho
Course - Big Data Business Intelligence for Govt. Agencies
The oral skills and human side of the trainer (Augustin).