Course Outline
Introduction to IoT Security
Overview of IoT Technologies
Understanding the Basic IoT Architecture
Understanding Major Security Risks and Issues in IoT
- IoT Vulnerabilities
- IoT Security Challenges
- Building Awareness of Attacks in IoT
Exploring Domain-Specific IoT Architectures
- eHealth IoT Security Architecture
- Industrial IoT Security Architecture
Security Architectures of Proximity Network Services
- Wi-Fi
- BLE
- SigFox
- LoRaWAN
- NB-IoT
Designing Security into IoT
- IoT Authentication and Authorization
- IoT Data Integrity
- IoT Security Standards
- Architecting IoT Security Domains
- Using IoT Services
Working with Technologies for IoT Security
- IoT Network Security
- Bayshore Networks
- Cisco
- Darktrace
- Senrio
- IoT Authentication
- Baimos Technologies
- Covisint
- Device Authority
- Entrust Datacard
- Gemalto
- IoT Encryption
- Cisco
- Entrust Datacard
- Gemalto
- HPE
- Lynx Software Technologies
- Symantec
- IoT PKI
- DigiCert
- Entrust Datacard
- Gemalto
- HPE
- Symantec
- WISeKey
- IoT Security Analytics
- Cisco
- Indegy
- Kaspersky Lab
- SAP
- Senrio
- IoT API Security
- Akana
- Apigee/Google
- Axway
- CA Technologies
- Mashery/TIBCO
- MuleSoft
- WSO2
Updating Your Organization's IoT Architecture for Security
Choosing the Right IoT Security Technologies for Your Organization
Summary and Conclusion
Requirements
- General familiarity with IoT
Audience
- IT Professionals
- Developers
- Engineers
- Managers
Testimonials (6)
Accessing tools and being able to ask questions to someone friendly who I felt wouldn't judge me
Kiara
Course - Open Source Cyber Intelligence - Introduction
The oral skills and human side of the trainer (Augustin).
Jeremy Chicon - TE Connectivity
Course - NB-IoT for Developers
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
Trainer's knowledge and experience in this field
Marcin - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
The training was fun and the trainer was very friendly.
Sevan Cimen - amfori
Course - Open Source Cyber Intelligence - Introduction
Lot's of information explained very well. Good examples, interesting exercises. Trainer showed us his real world experience.