IoT Security Training
- IoT Security Training: What is the Internet of Things (IoT)?
- Defining ‘Things’: Hardware, software, data, and services
- Core ideas
- IoT objectives
- Major players
- Why IoT is important
- Important IoT terms and trends
- Major security risks and issues
- Moore’s Law and its implications
- What is motivating deployment of the IoT and how will security affect it?
- What needs does IoT fill?
- The 4th Industrial Revolution
- Security and IoT deployment
- IoT enabling technologies and associated security vulnerabilities
- Cheap and ubiquitous telecommunications and computer hardware
- Cloud Computing
- Big Data, Event Stream Processing, Real-Time Analytics
- Machine Learning
- Wireless Sensor Networks (WSNs)
- Low power short-range and wide area wireless networks
- Embedded systems
- Automation and Control Systems
- Existing and emerging telecom technologies: Li-Fi, LPWAN, LTE-Advanced, 5G, WiFi-Direct, BLE, Low Energy, ZigBee, Z-Wave, Thread, HaLow, etc.
- Dealing with security concerns
- Known issues
- Emerging security vulnerabilities caused by IoT
- The shifting security landscape and how it affects IoT
- IoT architecture, implementation and security
- Where IoT fits in
- Standards and ecosystem
- Basic architecture concepts
- Implementation platforms
- Types of networks used by IoT
- Designing security into IoT
- What constitutes a secure system?
- What is a reasonable goal?
- How much will it cost?
- What happens when a new threat emerges?
- How do we know if an IoT system is worth the risk?
- IoT Security Training: Wrap-up and discussion
- Course recap
- How does your organization envision leveraging the IoT?
- Your organization’s IoT security concerns