This course is designed for practitioners who are seeking to demonstrate a vendor-neutral, cross-industry skill set that will enable them to design implement, operate, and/or manage a secure IoT ecosystem.
Prerequisites
To ensure your success in this course you should have a fundamental understanding of IoT ecosystems, which you can obtain by taking the following CertNexus course:
Certified Internet of Things (IoT) Practitioner (Exam ITP-110)
What you’ll learn in this course
This course is designed for practitioners who are seeking to demonstrate a vendor-neutral, cross-industry skill set that will enable them to design implement, operate, and/or manage a secure IoT ecosystem.
Course Outline
Lesson 1: Managing IoT Risks
Topic A: Map the IoT Attack Surface
Topic B: Build in Security by Design
Lesson 2: Securing Web and Cloud Interfaces
Topic A: Identify Threats to IoT Web and Cloud Interfaces
Topic B: Prevent Injection Flaws
Topic C: Prevent Session Management Flaws
Topic D: Prevent Cross-Site Scripting Flaws
Topic E: Prevent Cross-Site Request Forgery Flaws
Topic F: Prevent Unvalidated Redirects and Forwards
Lesson 3: Securing Data
Topic A: Use Cryptography Appropriately
Topic B: Protect Data in Motion
Copyright 2020 CertNexus. All Rights Reserved
Topic C: Protect Data at Rest
Topic D: Protect Data in Use
Lesson 4: Controlling Access to IoT Resources
Topic A: Identify the Need to Protect IoT Resources
Topic B: Implement Secure Authentication
Topic C: Implement Secure Authorization
Topic D: Implement Security Monitoring on IoT Systems
Lesson 5: Securing IoT Networks
Topic A: Ensure the Security of IP Networks
Topic B: Ensure the Security of Wireless Networks
Topic C: Ensure the Security of Mobile Networks
Topic D: Ensure the Security of IoT Edge Networks
Lesson 6: Ensuring Privacy
Topic A: Improve Data Collection to Reduce Privacy Concerns
Topic B: Protect Sensitive Data
Topic C: Dispose of Sensitive Data
Lesson 7: Managing Software and Firmware Risks
Topic A: Manage General Software Risks
Topic B: Manage Risks Related to Software Installation and Configuration
Topic C: Manage Risks Related to Software Patches and Updates
Topic D: Manage Risks Related to IoT Device Operating Systems and Firmware
Lesson 8: Promoting Physical Security
Topic A: Protect Local Memory and Storage
Topic B: Prevent Physical Port Access
Who are We?
We can help your company gain and develop all the technology skills it needs to rise to high-end challenges. After all, technology is the tool and only those who master it can capitalize on its benefits. Our customers and partners rely on us, and for very good reasons.
Setting the Stage for Next-Generation Digital Oilfield
This IoT course in Dubai explores the topics of origin of IoT, its impact, methodologies, and tools, and the application of IoT in integrated business applications to improve business results.
This training will provide you with knowledge and understanding to start making incredible devices capable of detecting and manipulating physical signals. It introduces you to the world of IoT by using Arduino and Node MCU.
Learn all you need to understand about 'IoT' and learn about the different IoT development boards, its characteristics, communication protocols, cloud platforms and much more.
© 2024 www.coursetakers.ae All Rights Reserved. Terms and Conditions of use | Privacy Policy