- General familiarity with IoT
Audience
- IT Professionals
- Developers
- Engineers
- Managers
Internet of Things (IoT) is a network infrastructure that connects physical objects and software applications wirelessly, allowing them to communicate with each other and exchange data via network communications, cloud computing, and data capture. One of the major hurdles in deployment of IoT solutions is security. Since IoT technologies involves a broad range of devices, designing IoT security is critical to a successful IoT deployment.
In this instructor-led, live training, participants will understand Internet of Things (IoT) architectures and learn the different IoT security solutions applicable to their organization.
By the end of this training, participants will be able to:
- Understand IoT architectures.
- Understand emerging IoT security threats and solutions.
- Implement technologies for IoT security in their organization.
Format of the course
- Part lecture, part discussion, exercises and heavy hands-on practice
Note
- To request a customized training for this course, please contact us to arrange
Introduction to IoT Security
Overview of IoT Technologies
Understanding the Basic IoT Architecture
Understanding Major Security Risks and Issues in IoT
- IoT Vulnerabilities
- IoT Security Challenges
- Building Awareness of Attacks in IoT
Exploring Domain-Specific IoT Architectures
- eHealth IoT Security Architecture
- Industrial IoT Security Architecture
Security Architectures of Proximity Network Services
- Wi-Fi
- BLE
- SigFox
- LoRaWAN
- NB-IoT
Designing Security into IoT
- IoT Authentication and Authorization
- IoT Data Integrity
- IoT Security Standards
- Architecting IoT Security Domains
- Using IoT Services
Working with Technologies for IoT Security
- IoT Network Security
- Bayshore Networks
- Cisco
- Darktrace
- Senrio
- IoT Authentication
- Baimos Technologies
- Covisint
- Device Authority
- Entrust Datacard
- Gemalto
- IoT Encryption
- Cisco
- Entrust Datacard
- Gemalto
- HPE
- Lynx Software Technologies
- Symantec
- IoT PKI
- DigiCert
- Entrust Datacard
- Gemalto
- HPE
- Symantec
- WISeKey
- IoT Security Analytics
- Cisco
- Indegy
- Kaspersky Lab
- SAP
- Senrio
- IoT API Security
- Akana
- Apigee/Google
- Axway
- CA Technologies
- Mashery/TIBCO
- MuleSoft
- WSO2
Updating Your Organization's IoT Architecture for Security
Choosing the Right IoT Security Technologies for Your Organization
Summary and Conclusion
United Arab Emirates - IoT Security Architecture
Qatar - IoT Security Architecture
Egypt - IoT Security Architecture
Saudi Arabia - IoT Security Architecture
South Africa - IoT Security Architecture
Brasil - IoT Security Architecture
Canada - IoT Security Architecture
中国 - IoT Security Architecture
香港 - IoT Security Architecture
澳門 - IoT Security Architecture
台灣 - IoT Security Architecture
USA - IoT Security Architecture
Österreich - IoT Security Architecture
Schweiz - IoT Security Architecture
Deutschland - IoT Security Architecture
Czech Republic - IoT Security Architecture
Denmark - IoT Security Architecture
Estonia - IoT Security Architecture
Finland - IoT Security Architecture
Greece - IoT Security Architecture
Magyarország - IoT Security Architecture
Ireland - IoT Security Architecture
Luxembourg - IoT Security Architecture
Latvia - IoT Security Architecture
España - Arquitectura de seguridad de IoT
Italia - IoT Security Architecture
Lithuania - IoT Security Architecture
Nederland - IoT Security Architecture
Norway - IoT Security Architecture
Portugal - IoT Security Architecture
România - IoT Security Architecture
Sverige - IoT Security Architecture
Türkiye - IoT Security Architecture
Malta - IoT Security Architecture
Belgique - IoT Security Architecture
France - IoT Security Architecture
日本 - IoT Security Architecture
Australia - IoT Security Architecture
Malaysia - IoT Security Architecture
New Zealand - IoT Security Architecture
Philippines - IoT Security Architecture
Singapore - IoT Security Architecture
Thailand - IoT Security Architecture
Vietnam - IoT Security Architecture
India - IoT Security Architecture
Argentina - Arquitectura de seguridad de IoT
Chile - Arquitectura de seguridad de IoT
Costa Rica - Arquitectura de seguridad de IoT
Ecuador - Arquitectura de seguridad de IoT
Guatemala - Arquitectura de seguridad de IoT
Colombia - Arquitectura de seguridad de IoT
México - Arquitectura de seguridad de IoT
Panama - Arquitectura de seguridad de IoT
Peru - Arquitectura de seguridad de IoT
Uruguay - Arquitectura de seguridad de IoT
Venezuela - Arquitectura de seguridad de IoT
Polska - IoT Security Architecture
United Kingdom - IoT Security Architecture
South Korea - IoT Security Architecture
Pakistan - IoT Security Architecture
Sri Lanka - IoT Security Architecture
Bulgaria - IoT Security Architecture
Bolivia - Arquitectura de seguridad de IoT
Indonesia - IoT Security Architecture
Kazakhstan - IoT Security Architecture
Moldova - IoT Security Architecture
Morocco - IoT Security Architecture
Tunisia - IoT Security Architecture
Kuwait - IoT Security Architecture
Oman - IoT Security Architecture
Slovakia - IoT Security Architecture
Kenya - IoT Security Architecture
Nigeria - IoT Security Architecture
Botswana - IoT Security Architecture
Slovenia - IoT Security Architecture
Croatia - IoT Security Architecture
Serbia - IoT Security Architecture
Bhutan - IoT Security Architecture