- An understanding of networking principles.
- Programming experience in any language.
- A cloud provider account.
Audience
- Developers
- Security professionals
- IoT architects
IoT application security refers to the technology and processes used to develop, manage and monitor the applications that control networked devices in an IoT system.
This instructor-led, live training (online or onsite) is aimed at engineers who wish to set up, deploy and manage a secure IoT application.
By the end of this training, participants will be able to:
- Develop and deploy applications to manage IoT devices securely.
- Securely integrate IoT devices to the Cloud.
- Integrate an IoT application with existing infrastructure.
Format of the course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- This course can be based on any of the major cloud providers: AWS, Google Cloud, and Azure.
- To request a customized training, please contact us to arrange.
Introduction
Preparing the Development Environment
- Device, development tools, SDK
IoT Security Services
- AWS IoT
- Google Cloud IoT Core
- Microsoft Azure Sphere
Planning an IoT Application
- Deciding Application Features
- Types of Device: Sensors, LCD Screens, Buzzers, etc.
- Certified vs Non-Certified IoT Devices
Anatomy of an IoT Device
- Microcontroller, Sensor, Battery, etc.
The IoT Ecosystem
- An architectural overview
- Cloud server security
- Device security
- Application security
Case Studies: Hacking a Home's Temperature Sensor.
IoT Security Lifecycle
- Security engineering processes
- OWASP Internet of Things (IoT) Project
Designing a Secure IoT Application
- Secure Communications (HTTPS, TLS/SSL, etc.)
- Data Integrity (Encryption, Hashing, etc.)
- Identity and Access Management
Scaling an Application
- Fault Tolerance
Integration IoT Devices into Existing Security Infrastructure
- Extending existing systems
Deploying an IoT Application
- Monitoring the Application
- Testing the security of the application
Assessment
- IoT Privacy Impact Assessment (PIA)
- Safety Impact Assessment
Troubleshooting
Summary and Conclusion
United Arab Emirates - Securing Cloud and IoT Applications
Qatar - Securing Cloud and IoT Applications
Egypt - Securing Cloud and IoT Applications
Saudi Arabia - Securing Cloud and IoT Applications
South Africa - Securing Cloud and IoT Applications
Brasil - Securing Cloud and IoT Applications
Canada - Securing Cloud and IoT Applications
中国 - Securing Cloud and IoT Applications
香港 - Securing Cloud and IoT Applications
澳門 - Securing Cloud and IoT Applications
台灣 - Securing Cloud and IoT Applications
USA - Securing Cloud and IoT Applications
Österreich - Securing Cloud and IoT Applications
Schweiz - Securing Cloud and IoT Applications
Deutschland - Securing Cloud and IoT Applications
Czech Republic - Securing Cloud and IoT Applications
Denmark - Securing Cloud and IoT Applications
Estonia - Securing Cloud and IoT Applications
Finland - Securing Cloud and IoT Applications
Greece - Securing Cloud and IoT Applications
Magyarország - Securing Cloud and IoT Applications
Ireland - Securing Cloud and IoT Applications
Luxembourg - Securing Cloud and IoT Applications
Latvia - Securing Cloud and IoT Applications
España - Securing Cloud and IoT Applications
Italia - Securing Cloud and IoT Applications
Lithuania - Securing Cloud and IoT Applications
Nederland - Securing Cloud and IoT Applications
Norway - Securing Cloud and IoT Applications
Portugal - Securing Cloud and IoT Applications
România - Securing Cloud and IoT Applications
Sverige - Securing Cloud and IoT Applications
Türkiye - Securing Cloud and IoT Applications
Malta - Securing Cloud and IoT Applications
Belgique - Securing Cloud and IoT Applications
France - Securing Cloud and IoT Applications
日本 - Securing Cloud and IoT Applications
Australia - Securing Cloud and IoT Applications
Malaysia - Securing Cloud and IoT Applications
New Zealand - Securing Cloud and IoT Applications
Philippines - Securing Cloud and IoT Applications
Singapore - Securing Cloud and IoT Applications
Thailand - Securing Cloud and IoT Applications
Vietnam - Securing Cloud and IoT Applications
India - Securing Cloud and IoT Applications
Argentina - Securing Cloud and IoT Applications
Chile - Securing Cloud and IoT Applications
Costa Rica - Securing Cloud and IoT Applications
Ecuador - Securing Cloud and IoT Applications
Guatemala - Securing Cloud and IoT Applications
Colombia - Securing Cloud and IoT Applications
México - Securing Cloud and IoT Applications
Panama - Securing Cloud and IoT Applications
Peru - Securing Cloud and IoT Applications
Uruguay - Securing Cloud and IoT Applications
Venezuela - Securing Cloud and IoT Applications
Polska - Securing Cloud and IoT Applications
United Kingdom - Securing Cloud and IoT Applications
South Korea - Securing Cloud and IoT Applications
Pakistan - Securing Cloud and IoT Applications
Sri Lanka - Securing Cloud and IoT Applications
Bulgaria - Securing Cloud and IoT Applications
Bolivia - Securing Cloud and IoT Applications
Indonesia - Securing Cloud and IoT Applications
Kazakhstan - Securing Cloud and IoT Applications
Moldova - Securing Cloud and IoT Applications
Morocco - Securing Cloud and IoT Applications
Tunisia - Securing Cloud and IoT Applications
Kuwait - Securing Cloud and IoT Applications
Oman - Securing Cloud and IoT Applications
Slovakia - Securing Cloud and IoT Applications
Kenya - Securing Cloud and IoT Applications
Nigeria - Securing Cloud and IoT Applications
Botswana - Securing Cloud and IoT Applications
Slovenia - Securing Cloud and IoT Applications
Croatia - Securing Cloud and IoT Applications
Serbia - Securing Cloud and IoT Applications
Bhutan - Securing Cloud and IoT Applications