Internet of Things Security (W35) - Pentestmag

This course introduces the Internet of Things (IoT), its building blocks, protocols and the security challenges that the IoT currently faces. The course discusses several IoT attacks and analyses these with a view to encouraging the student to think about ways in which the affected IoT nodes and networks can be better protected.


18 CPE CREDITS
This course is self-paced and pre-recorded


Disclaimer

None of the material presented within or as part of this course may be used for malicious purposes. Using whatever they learn on this course, the student bears all responsibility for the consequences of their intentions and actions. The materials presented are for the purpose of learning and, by taking this course, students agree that the knowledge and skills gained may not be exploited for malicious purposes.


This course covers:

• An introduction to the Internet of Things (IoT)
• Threat points within the IoT
• Vulnerabilities which affect the IoT
• Exploiting the relevant threat points
• The UK laws which apply to cybercrimes and the IoT


You will need:

• An enthusiastic interest in the IoT and cybersecurity
• Some research skills
• Some basic computing and cybersecurity knowledge
• Access to the Internet to be able to view online videos  and access referenced resources
• Optional for hands-on practice: your own IoT device with relevant analysis tools to try some of the referenced exercises in their own control environment


Course syllabus


Module 1: Introduction to The Internet of Things (IoT)

Module 1 Summary: This module defines the Internet of Things (IoT), discusses some IoT real-world use cases including in the areas of Healthcare, Homes, Transportation, Energy, Wearables and Cities. This module also looks at different IoT protocols, ports, terminologies, and example IoT Architectures.

Module 1 Exercises and Research Tasks: To complete this module students will be required to answer some questions on several topic areas including on IoT protocols, networking and basic security.


Module 2: Threats, Vulnerabilities, Attacks, and United Kingdom Laws.

Module 2 Summary: In this module, we will review security measures currently employed in the IoT and explore the adequacy or otherwise of these measures. This will form the backdrop for a discussion on the different threat points which can be exploited as part of a cyber-physical security exercise or attack.

Module 2 Exercises and Research Tasks: To complete this module students will be required to firstly answer two (2) questions: one on IoT security challenges and the other on secure IoT network design. Secondly, the students will be required to answer questions on Laws (UK and in their own current location) that apply to cyber, digital and computer crimes.


Module 3: Cyber-physical attacks on IoT devices – some examples.

Module 3 Summary: This module reviews several IoT-related “attack” exercises. We will look in detail at vulnerabilities and exposures in some IoT devices and discuss how identified vulnerabilities and/or non-secure protocol implementations, etc. in Baby monitors, Fridges and Autonomous Vehicles can be exploited.

The course ends with final exam that will consist of 25 questions multiple choice and open questions.



Your Instructor: Edewede Oriwoh (MSc, PhD)

Edewede is a Cyber-security and cyber–physical security expert, a Digital Forensics professional, an Incident Response Specialist, a Guest Speaker, and an Author. She has extensive experience with setting up hacking exercises and is an enthusiastic cyber-security evangelist.


Contact
Questions? Reach out to us at [email protected]

Course Reviews

5

5
1 ratings
  • 5 stars1
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0
  1. anushka chhoker

    5

    i love this

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023