Certified IoT Security Professional (CIoTSP)
Introduction:
The ability to connect, communicate with, and remotely manage an incalculable number of networked, automated devices (approximately 26 Billion by 2020) via the Internet is becoming pervasive, from the factory floor to the hospital operating room to the residential basement. The transition from closed networks to enterprise IT networks to the public Internet is accelerating at an alarming pace—and justly raising alarms about security. As we become increasingly reliant on intelligent, interconnected devices in every aspect of our lives, how do we protect potentially billions of them from intrusions and interference that could compromise personal privacy or threaten public safety? This training covers the basics and Intermediate levels of IoT landscape and takes you through IoT Security Challenges and vulnerabilities and teaches you the steps to hack and harden the IoT devices, applications and ecosystem.
Training Approach
The training would involve both theory and practical led by the instructor . Easy to understand case study-based real life approach. In depth knowledge from experienced trainer.
Who Should Attend?
This course is recommended for IoT Enthusiasts, IoT Designers, IoT Developers, IoT Implementers, IT Managers, IT Auditors and anyone who is ready to master the steps required to secure IOT Implementations.
Prerequisites
- Should be involved in the IT field.
- Should be familiar with using Windows, Linux and VMWare.
- Should understand programming concepts, but programming experience is not mandatory.
- Background knowledge in reverse code engineering and vulnerability assessment will be helpful, but not required.
- Enthusiasm is a must.
Course Outline
Chap 1. Overview of IOT technologies
What is IoT?
IoT Architecture & Ecosystem
Hardware & Software Platforms
Communication Channels & Protocols
Cloud & IoT
Cloud & RESTful Web Services
Data Streaming & IoT
IoT Myths
IoT Applications
- Agriculture
- Medical
- Meteorology
Chap 2. IoT Security Overview
Overview of IOT Security
IoT Threats
Challenges to Secure IoT Deployments
Types of IoT Attacks
Chap 3. Baseline Policies for IoT Security
IoT Security Controls Lifecyle
Authentication / Authorization
Logging & Audit Framework
Privacy by Design
Data Protection Policies
Chap 4. IoT Vulnerabilities
Insecure Web Interface
Insufficient Authentication/Authorization
Insecure Network Services
Lack of Transport Encryption
Privacy concerns
Insecure Cloud Interface
Insecure Mobile Interface
Insufficient Security Configurability
Insecure Software/Firmware
Poor Physical Security
Chap. 5 IoT Endpoint Security Guidelines
IoT Endpoint Security Challenges
IoT Endpoint Security Model and Recommendations.
Secure the IoT Systems
Securing the IoT Network.
IPv4 Based Security Guidelines
IPv6 Based Security Guidelines
Data Link Layer Based Network Guidelines
Chap. 6 IoT Security Recommendations
High Priority Security Recommendations
Medium Priority Recommendations
Low Priority Recommendations
5G based IoT Endpoint Security Recommendations
Practical Hacking IoT Devices (Hands On)
IOT Lab installation (install Kali Linux, install required tools)
IoT
Security Lan installation
IoT Operating system Security
IoT communication (Wifi/Bluetooth) security
IoT vulnerability search engine