Course Code: iotsecurity
Duration: 14 hours
Prerequisites:
  • General familiarity with IoT

Audience

  • IT Professionals
  • Developers
  • Engineers
  • Managers
Overview:

Internet of Things (IoT) is a network infrastructure that connects physical objects and software applications wirelessly, allowing them to communicate with each other and exchange data via network communications, cloud computing, and data capture. One of the major hurdles in deployment of IoT solutions is security. Since IoT technologies involves a broad range of devices, designing IoT security is critical to a successful IoT deployment.

In this instructor-led, live training, participants will understand Internet of Things (IoT) architectures and learn the different IoT security solutions applicable to their organization.

By the end of this training, participants will be able to:

  • Understand IoT architectures.
  • Understand emerging IoT security threats and solutions.
  • Implement technologies for IoT security in their organization.

Format of the course

  • Part lecture, part discussion, exercises and heavy hands-on practice

Note

  • To request a customized training for this course, please contact us to arrange
Course Outline:

Introduction to IoT Security

Overview of IoT Technologies

Understanding the Basic IoT Architecture

Understanding Major Security Risks and Issues in IoT

  • IoT Vulnerabilities
  • IoT Security Challenges
  • Building Awareness of Attacks in IoT

Exploring Domain-Specific IoT Architectures

  • eHealth IoT Security Architecture
  • Industrial IoT Security Architecture

Security Architectures of Proximity Network Services

  • Wi-Fi
  • BLE
  • SigFox
  • LoRaWAN
  • NB-IoT

Designing Security into IoT

  • IoT Authentication and Authorization
  • IoT Data Integrity
  • IoT Security Standards
  • Architecting IoT Security Domains
  • Using IoT Services

Working with Technologies for IoT Security

  • IoT Network Security
    • Bayshore Networks
    • Cisco
    • Darktrace
    • Senrio
  • IoT Authentication
    • Baimos Technologies
    • Covisint
    • Device Authority
    • Entrust Datacard
    • Gemalto
  • IoT Encryption
    • Cisco
    • Entrust Datacard
    • Gemalto
    • HPE
    • Lynx Software Technologies
    • Symantec
  • IoT PKI
    • DigiCert
    • Entrust Datacard
    • Gemalto
    • HPE
    • Symantec
    • WISeKey
  • IoT Security Analytics
    • Cisco
    • Indegy
    • Kaspersky Lab
    • SAP
    • Senrio
  • IoT API Security
    • Akana
    • Apigee/Google
    • Axway
    • CA Technologies
    • Mashery/TIBCO
    • MuleSoft
    • WSO2

Updating Your Organization's IoT Architecture for Security

Choosing the Right IoT Security Technologies for Your Organization

Summary and Conclusion

Sites Published:

United Arab Emirates - IoT Security Architecture

Qatar - IoT Security Architecture

Egypt - IoT Security Architecture

Saudi Arabia - IoT Security Architecture

South Africa - IoT Security Architecture

Brasil - IoT Security Architecture

Canada - IoT Security Architecture

中国 - IoT Security Architecture

香港 - IoT Security Architecture

澳門 - IoT Security Architecture

台灣 - IoT Security Architecture

USA - IoT Security Architecture

Österreich - IoT Security Architecture

Schweiz - IoT Security Architecture

Deutschland - IoT Security Architecture

Czech Republic - IoT Security Architecture

Denmark - IoT Security Architecture

Estonia - IoT Security Architecture

Finland - IoT Security Architecture

Greece - IoT Security Architecture

Magyarország - IoT Security Architecture

Ireland - IoT Security Architecture

Luxembourg - IoT Security Architecture

Latvia - IoT Security Architecture

España - Arquitectura de seguridad de IoT

Italia - IoT Security Architecture

Lithuania - IoT Security Architecture

Nederland - IoT Security Architecture

Norway - IoT Security Architecture

Portugal - IoT Security Architecture

România - IoT Security Architecture

Sverige - IoT Security Architecture

Türkiye - IoT Security Architecture

Malta - IoT Security Architecture

Belgique - IoT Security Architecture

France - IoT Security Architecture

日本 - IoT Security Architecture

Australia - IoT Security Architecture

Malaysia - IoT Security Architecture

New Zealand - IoT Security Architecture

Philippines - IoT Security Architecture

Singapore - IoT Security Architecture

Thailand - IoT Security Architecture

Vietnam - IoT Security Architecture

India - IoT Security Architecture

Argentina - Arquitectura de seguridad de IoT

Chile - Arquitectura de seguridad de IoT

Costa Rica - Arquitectura de seguridad de IoT

Ecuador - Arquitectura de seguridad de IoT

Guatemala - Arquitectura de seguridad de IoT

Colombia - Arquitectura de seguridad de IoT

México - Arquitectura de seguridad de IoT

Panama - Arquitectura de seguridad de IoT

Peru - Arquitectura de seguridad de IoT

Uruguay - Arquitectura de seguridad de IoT

Venezuela - Arquitectura de seguridad de IoT

Polska - IoT Security Architecture

United Kingdom - IoT Security Architecture

South Korea - IoT Security Architecture

Pakistan - IoT Security Architecture

Sri Lanka - IoT Security Architecture

Bulgaria - IoT Security Architecture

Bolivia - Arquitectura de seguridad de IoT

Indonesia - IoT Security Architecture

Kazakhstan - IoT Security Architecture

Moldova - IoT Security Architecture

Morocco - IoT Security Architecture

Tunisia - IoT Security Architecture

Kuwait - IoT Security Architecture

Oman - IoT Security Architecture

Slovakia - IoT Security Architecture

Kenya - IoT Security Architecture

Nigeria - IoT Security Architecture

Botswana - IoT Security Architecture

Slovenia - IoT Security Architecture

Croatia - IoT Security Architecture

Serbia - IoT Security Architecture

Bhutan - IoT Security Architecture

Nepal - IoT Security Architecture

Uzbekistan - IoT Security Architecture