Length: 2 Days
IoT Security Training
The Internet of Things (IoT) is any inter networking of a device that connects to the Internet in order to exchange data.
This covers a wide range of devices, spanning watches to computer programs; hardware sensors to toasters. Sometimes IoT devices are referred to as “smart.” So a smartphone, smartwatch or anything else with the tag “smart” on the front end of it generally is part of the IoT category.
The possibilities are endless with what can be done, and businesses are expected to find new ways to use IoT devices over time. However, IoT devices may provide a backdoor into a corporate network for skilled hackers and cyber criminals. The weakest link defines the strength of network security and often times this weak link lies within an Internet of Things connected device.
The concern is so substantial that the Federal Trade Commission has gotten involved by putting out recommendations for companies using IoT devices in order to ensure the privacy of the American consumer. This is significant because the FTC generally doesn’t interfere with the technological usage of companies within the United States.
The biggest IoT security risks involve software. Software attacks can exploit entire systems, steal information, alter data, deny service and compromise or damage devices.
In a phishing attack, for example, bad actors gain access by impersonating a legitimate entity to trick users into providing access or credentials. Attackers also use malware, such as viruses, worms and Trojans, to damage or delete data, steal information, monitor users and disrupt key system functions.
Meanwhile, malicious ActiveX scripts can target users with access to the network gateway to shut down the IoT system entirely.
Measures that can help protect you from IoT-induced cyberattacks include installing reputable internet security software on all computers, tablets and smartphones. Security software can provide real-time protection against emerging malware, including ransomware and viruses.
Another protective measure involves doing your due diligence before buying a device that will connect to the IoT.
IoT Security Training Course by Tonex
IoT Security Training covers The Internet of Things security and discusses IoT protocols, potential risks, vulnerabilities, exploitation, data breaches, security framework and mitigation. IoT Security Training, Internet of Things (IoT) devices Include: manufacturers, retailers in consumer electronics, healthcare, factory supply chain warehouses, transportation facilities and many others.
Learn about risks of unsecured enterprise and home IoT devices connecting to the Internet and able to share the information they generate.
Topics include device and platform vulnerabilities, authentication and authorization, Web interface and software, transport encryption, management issues, privacy and security enhancements and other IoT issues observed for various manufacturers across all industry sectors.
- IoT Principles: The Internet of Things Overview
- Principles for Connected Devices
- IoT Design Principles
- Principles of IoT Security
- IoT Attack Areas
- IoT Vulnerabilities
- IoT Firmware Analysis
- IoT Software Weaknesses
- IoT Security Verification, Validation and Testing
- IoT Security Assessment on IoT devices
- Assessing IoT devices attack surfaces
- Evaluation of IoT device firmware analysis, attack surface, vulnerabilities and exploiting the vulnerabilities
Course Topics Include:
- Overview and analysis of IoT devices and IoT implementation use cases
- IoT Architecture
- IoT Architectural and Design Requirements
- IoT Security Fundamentals
- IoT Security Standards
- NIST Framework: Cyber Physical Systems
- IoT Governance and Risk Management
- IoT Security Compliance and Audit
- IoT Encryption and Key Management
- IoT Identity and Access Management IoT Security Challenges
- IoT Security in Critical Infrastructure
- IoT Security in Personal infrastructure
- IoT Vulnerabilities
- Wireless Security applied to IoT
- ZigBee and Bluetooth Security
- LTE and Mobile Security
- Cloud-based web interface security
- Cloud interfaces for XSS, SQLi and CSRF vulnerabilities IoT Data Security
- IoT Platform, Device and Infrastructure Security
- IoT Management and Operations Security
- IoT Security Legal and Compliance
- Tonex IoT Security Framework
- Threats to IoT Devices and Implementations
- Known IoT Cyber Security Threats
- IoT Security Controls
- IoT Implementations Security best practices
- Gaps in IoT Security and technical solutions
- Procedures and methods for securing the IoT
- Best practices in securing cloud infrastructure and services supporting the IoT devices and environments
- IoT Security auditing, identity and access management
- IoT Authentication, encryption, access control, privacy, data integrity and risk management
- IoT Devices Firmware Analysis
- IoT Attack and Phishing Simulation
IoT Security Training