• LOGIN
  • No products in the cart.

This three-module course introduces the Internet of Things (IoT), the building blocks, protocols and the security challenges that this network faces. It introduces a viewpoint for approaching a cybersecurity exercise within the IoT and it discusses several IoT attacks and analyses these with a view to encouraging the learner to think of ways in which the affected IoT nodes can be better protected.


Special discount for the first 10 seats! Hurry up and buy the course for $189 ONLY!


COURSE START DATE: August 1st
18 CPE CREDITS
THE COURSE IS SELF-PACED


Disclaimer

None of the material presented in or as part of this course may be used for malicious purposes. Using whatever they learn on this course, the student bears all responsibility for the consequences of their actions and intentions. Students must agree that the skills and knowledge gained are presented for the improvement of learning and not to be exploited for malicious purposes.


This course covers:

• An introduction to the Internet of Things (IoT)
• Threat points within the IoT
• The current vulnerabilities which affect the IoT
• Exploiting the relevant threat points
• The UK laws which apply to cybercrimes


You will need:

• An enthusiastic interest in the IoT and cybersecurity
• Some research skills
• Some basic computing and especially cybersecurity knowledge e.g. IP addresses, port numbers, and communications protocols such as Bluetooth, WiFi
• Access to the Internet to view online videos
• Optional for hands-on practice: your own IoT device, the relevant sniffing tools depending on the protocol used in your IoT tool


Course syllabus


Module 1: Introduction to The Internet of Things (IoT)

Module 1 Summary: In this module, you will be introduced to the Internet of Things (IoT). You will learn about what it is, other names used to refer to the IoT such as Future Internet, IoE, etc. and learn about the current protocols being used to develop the IoT.
• Definition of the Internet of Things (IoT)
• IoT History: The Internet, Social media and now the IoT
• Uses and Benefits: Health, Home, Transportation, energy, Social network, Wearables, Cities. Will include real-world use cases from across the globe.
• IoT Technologies: Terms, protocols, ports, definitions (IoT, Things, Smart, Cloud, Machine Learning, etc.)
• IoT Architecture and building blocks. Understand the Publisher, Broker, Subscriber model.
• IoT nodes and how they function: sensing, actuation, data storage, etc.

Module 1 Exercises and Research Tasks: To complete this module you will need to answer couple open question related  to different IoT devices.


Module 2: Investigating current security measures employed in IoT nodes. This module will also cover potential laws which apply to Cyber-physical crimes.

Module 2 Summary: In this module, we will investigate and discuss the current existing security measures employed in IoT devices, and the adequacy of these security measures. This will form an introduction to the different threat points which can be exploited as part of a cyber-physical security exercise or attack.

Module 2 Exercises and Research Tasks: To complete this module you will need to answer couple open question related to different IoT devices.


Module 3: Threats to the IoT and Hacking common IoT devices.

Module 3 Summary: This module will begin by looking at the threats, threat points in the IoT, Privacy, Security, Reconnaissance, Preparation, Infection, Persistence as part of attacking an IoT network and device. In this module we will also discuss hacking IoT nodes (devices). When hacking is discussed in relation to atypical IoT nodes, the general approach is to understand the devices in question, the communication types (wired or wireless) and the protocol in use.

In this module we will focus on the MQTT protocol because it is, at present, one of the most commonly used in IoT-based devices. We will explore what it is, how it works and how it can be exploited and this will feed into a discussion in module three for methods and suggestions for making MQTT and similar protocols more secure. Links to several demonstrations which show how to hack IoT nodes are provided and discussed within this module. (One example: https://www.youtube.com/watch?v=s8LT4_kH2f8)

Bearing in mind that different companies still use a variety of protocols to enable communication to and from their products (Things), we cannot comprehensively cover all the different product types or protocols. It is more important to understand how these protocols work which will enable us to know how to address the IoT at its most basic level.

Module 3 Exercises and Research Tasks: To complete this module you will need to answer couple open question related to different IoT devices.

Course ends with final exam that will consist of around 25 multiple choice questions.


Your Instructor: Edewede Oriwoh (MSc, PhD)

She is a Cyber-Security and Cyber–physical security expert, a Digital Forensics Investigator, an Incident Response Specialist, a Lecturer, a Guest Speaker, Writer and Threat Hunter. She has experience with setting up hacking exercises and tests and is an enthusiastic cyber-security evangelist.

Course Reviews

N.A

ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

TAKE THIS COURSECOURSE STARTS IN 1 week
  • $219.00 $189.00
  • 1 weekSTARTS IN
  • UNLIMITED ACCESS
  • Course Certificate
27 STUDENTS ENROLLED
  • Profile photo of Anna Kondzierska
  • Profile photo of bjnvdb
  • Profile photo of masaanderson
  • Profile photo of nadimelawar
  • Profile photo of mpino79
  • Profile photo of nashie

Certificate Code

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013