This course is designed for network security engineers and analysts who are tasked with designing secure network environments, implementing security policies and protocols related to IoT devices, and analyzing network systems for operational and security considerations, in addition to the security operations center (SOC) analysts who analyze and respond to security incidents, and develop organizational response processes. It is also beneficial to solutions architects, developers, and testers who design, develop, and test software solutions for their organizations. This certification is also relevant to operations engineers who deploy and maintain embedded and mission critical systems and perform organizational gap analysis.

starstarstarstarstar_outline

* Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Learning Objectives

This program will validate that the candidate has the knowledge, skills, and abilities to secure network environments for IoT devices, analyze vulnerabilities and determine reasonable controls against threats, and effectively monitor IoT devices and respond to incidents.

1
  • Managing IoT Risks

  • Map the IoT Attack Surface
    Build in Security by Design

2
  • Securing Web and Cloud Interfaces

  • Identify Threats to IoT Web and Cloud Interfaces
    Prevent Injection Flaws
    Prevent Session Management Flaws
    Prevent Cross-Site Scripting Flaws
    Prevent Cross-Site Request Forgery Flaws
    Prevent Unvalidated Redirects and Forwards

3
  • Securing Data

  • Use Cryptography Appropriately
    Protect Data in Motion
    Protect Data at Rest
    Protect Data in Use

4
  • Controlling Access to IoT Resources

  • Identify the Need to Protect IoT
    Implement Secure Authentication
    Implement Secure Authorization
    Implement Security Monitoring on IoT Systems

5
  • Securing IoT Networks

  • Ensure the Security of IP Networks
    Ensure the Security of Wireless Networks
    Ensure the Security of Mobile Networks
    Ensure the Security of IoT Edge Networks

6
  • Ensuring Privacy

  • Improve Data Collection to Reduce Privacy Concerns
    Protect Sensitive Data
    Dispose of Sensitive Data

7
  • Managing Software and Firmware Risks

  • Manage General Software Risks
    Manage Risks Related to Software Installation and Configuration
    Manage Risks Related to Software Patches and Updates
    Manage Risks Related to IoT Device Operating Systems and Firmware

8
  • Promoting Physical Security

  • Protect Local Memory and Storage
    Prevent Physical Port Access

Audience

This course is designed for IoT practitioners who are looking to improve their skills and knowledge of IoT security and privacy. This course is also designed for students who are seeking the CertNexus Certified Internet of Things Security Practitioner (CIoTSP) certification and who want to prepare for Exam ITS-110.

Language

English

Prerequisites

To ensure your success in this course you should have a fundamental understanding of IoT ecosystems

$2,085

Length: 3.0 days (24 hours)

Level:

Not Your Location? Change

Course Schedule:

To request a custom delivery, please chat with an expert.

Loading...