Get in Touch

Course Outline

Introduction to IoT Security

Overview of IoT Technologies

Understanding the Basic IoT Architecture

Understanding Major Security Risks and Issues in IoT

  • IoT Vulnerabilities.
  • IoT Security Challenges.
  • Building Awareness of Attacks in IoT.

Exploring Domain-Specific IoT Architectures

  • eHealth IoT Security Architecture.
  • Industrial IoT Security Architecture.

Security Architectures of Proximity Network Services

  • Wi-Fi.
  • BLE.
  • SigFox.
  • LoRaWAN.
  • NB-IoT.

Designing Security into IoT

  • IoT Authentication and Authorization.
  • IoT Data Integrity.
  • IoT Security Standards.
  • Architecting IoT Security Domains.
  • Using IoT Services.

Working with Technologies for IoT Security

  • IoT Network Security
    • Bayshore Networks.
    • Cisco.
    • Darktrace.
    • Senrio.
  • IoT Authentication
    • Baimos Technologies.
    • Covisint.
    • Device Authority.
    • Entrust Datacard.
    • Gemalto.
  • IoT Encryption
    • Cisco.
    • Entrust Datacard.
    • Gemalto.
    • HPE.
    • Lynx Software Technologies.
    • Symantec.
  • IoT PKI
    • DigiCert.
    • Entrust Datacard.
    • Gemalto.
    • HPE.
    • Symantec.
    • WISeKey.
  • IoT Security Analytics
    • Cisco.
    • Indegy.
    • Kaspersky Lab.
    • SAP.
    • Senrio.
  • IoT API Security
    • Akana.
    • Apigee/Google.
    • Axway.
    • CA Technologies.
    • Mashery/TIBCO.
    • MuleSoft.
    • WSO2.

Updating Your Organization's IoT Architecture for Security

Choosing the Right IoT Security Technologies for Your Organization

Summary and Conclusion

Requirements

  • General familiarity with IoT.

Audience

  • IT Professionals.
  • Developers.
  • Engineers.
  • Managers.
 14 Hours

Number of participants


Price per participant

Testimonials (3)

Upcoming Courses

Related Categories