Course Code: iotappsecurity
Duration: 21 hours
Prerequisites:
  • An understanding of networking principles.
  • Programming experience in any language.
  • A cloud provider account.

Audience

  • Developers
  • Security professionals
  • IoT architects
Overview:

IoT application security refers to the technology and processes used to develop, manage and monitor the applications that control networked devices in an IoT system.

This instructor-led, live training (online or onsite) is aimed at engineers who wish to set up, deploy and manage a secure IoT application.

By the end of this training, participants will be able to:

  • Develop and deploy applications to manage IoT devices securely.
  • Securely integrate IoT devices to the Cloud.
  • Integrate an IoT application with existing infrastructure.

Format of the course

  • Interactive lecture and discussion.
  • Lots of exercises and practice.
  • Hands-on implementation in a live-lab environment.

Course Customization Options

  • This course can be based on any of the major cloud providers: AWS, Google Cloud, and Azure.
  • To request a customized training, please contact us to arrange.
Course Outline:

Introduction

Preparing the Development Environment

  • Device, development tools, SDK

IoT Security Services

  • AWS IoT
  • Google Cloud IoT Core
  • Microsoft Azure Sphere

Planning an IoT Application

  • Deciding Application Features
  • Types of Device: Sensors, LCD Screens, Buzzers, etc.
  • Certified vs Non-Certified IoT Devices

Anatomy of an IoT Device

  • Microcontroller, Sensor, Battery, etc.

The IoT Ecosystem

  • An architectural overview
  • Cloud server security
  • Device security
  • Application security

Case Studies: Hacking a Home's Temperature Sensor.

IoT Security Lifecycle 

  • Security engineering processes
  • OWASP Internet of Things (IoT) Project

Designing a Secure IoT Application

  • Secure Communications (HTTPS, TLS/SSL, etc.)
  • Data Integrity (Encryption, Hashing, etc.)
  • Identity and Access Management

Scaling an Application

  • Fault Tolerance

Integration IoT Devices into Existing Security Infrastructure 

  • Extending existing systems

Deploying an IoT Application

  • Monitoring the Application
  • Testing the security of the application

Assessment

  • IoT Privacy Impact Assessment (PIA)
  • Safety Impact Assessment

Troubleshooting

Summary and Conclusion

Sites Published:

United Arab Emirates - Securing Cloud and IoT Applications

Qatar - Securing Cloud and IoT Applications

Egypt - Securing Cloud and IoT Applications

Saudi Arabia - Securing Cloud and IoT Applications

South Africa - Securing Cloud and IoT Applications

Brasil - Securing Cloud and IoT Applications

Canada - Securing Cloud and IoT Applications

中国 - Securing Cloud and IoT Applications

香港 - Securing Cloud and IoT Applications

澳門 - Securing Cloud and IoT Applications

台灣 - Securing Cloud and IoT Applications

USA - Securing Cloud and IoT Applications

Österreich - Securing Cloud and IoT Applications

Schweiz - Securing Cloud and IoT Applications

Deutschland - Securing Cloud and IoT Applications

Czech Republic - Securing Cloud and IoT Applications

Denmark - Securing Cloud and IoT Applications

Estonia - Securing Cloud and IoT Applications

Finland - Securing Cloud and IoT Applications

Greece - Securing Cloud and IoT Applications

Magyarország - Securing Cloud and IoT Applications

Ireland - Securing Cloud and IoT Applications

Luxembourg - Securing Cloud and IoT Applications

Latvia - Securing Cloud and IoT Applications

España - Securing Cloud and IoT Applications

Italia - Securing Cloud and IoT Applications

Lithuania - Securing Cloud and IoT Applications

Nederland - Securing Cloud and IoT Applications

Norway - Securing Cloud and IoT Applications

Portugal - Securing Cloud and IoT Applications

România - Securing Cloud and IoT Applications

Sverige - Securing Cloud and IoT Applications

Türkiye - Securing Cloud and IoT Applications

Malta - Securing Cloud and IoT Applications

Belgique - Securing Cloud and IoT Applications

France - Securing Cloud and IoT Applications

日本 - Securing Cloud and IoT Applications

Australia - Securing Cloud and IoT Applications

Malaysia - Securing Cloud and IoT Applications

New Zealand - Securing Cloud and IoT Applications

Philippines - Securing Cloud and IoT Applications

Singapore - Securing Cloud and IoT Applications

Thailand - Securing Cloud and IoT Applications

Vietnam - Securing Cloud and IoT Applications

India - Securing Cloud and IoT Applications

Argentina - Securing Cloud and IoT Applications

Chile - Securing Cloud and IoT Applications

Costa Rica - Securing Cloud and IoT Applications

Ecuador - Securing Cloud and IoT Applications

Guatemala - Securing Cloud and IoT Applications

Colombia - Securing Cloud and IoT Applications

México - Securing Cloud and IoT Applications

Panama - Securing Cloud and IoT Applications

Peru - Securing Cloud and IoT Applications

Uruguay - Securing Cloud and IoT Applications

Venezuela - Securing Cloud and IoT Applications

Polska - Securing Cloud and IoT Applications

United Kingdom - Securing Cloud and IoT Applications

South Korea - Securing Cloud and IoT Applications

Pakistan - Securing Cloud and IoT Applications

Sri Lanka - Securing Cloud and IoT Applications

Bulgaria - Securing Cloud and IoT Applications

Bolivia - Securing Cloud and IoT Applications

Indonesia - Securing Cloud and IoT Applications

Kazakhstan - Securing Cloud and IoT Applications

Moldova - Securing Cloud and IoT Applications

Morocco - Securing Cloud and IoT Applications

Tunisia - Securing Cloud and IoT Applications

Kuwait - Securing Cloud and IoT Applications

Oman - Securing Cloud and IoT Applications

Slovakia - Securing Cloud and IoT Applications

Kenya - Securing Cloud and IoT Applications

Nigeria - Securing Cloud and IoT Applications

Botswana - Securing Cloud and IoT Applications

Slovenia - Securing Cloud and IoT Applications

Croatia - Securing Cloud and IoT Applications

Serbia - Securing Cloud and IoT Applications

Bhutan - Securing Cloud and IoT Applications

Nepal - Securing Cloud and IoT Applications

Uzbekistan - Securing Cloud and IoT Applications