Internet of Things Security (W35)

$219.00

4 in stock


Get the access to all our courses via Subscription

Subscribe

Description

This course introduces the Internet of Things (IoT), its building blocks, protocols and the security challenges that the IoT currently faces. The course discusses several IoT attacks and analyses these with a view to encouraging the student to think about ways in which the affected IoT nodes and networks can be better protected.


18 CPE CREDITS
THE COURSE IS SELF-PACED AND PRE-RECORDED


Disclaimer

None of the material presented within or as part of this course may be used for malicious purposes. Using whatever they learn on this course, the student bears all responsibility for the consequences of their intentions and actions. The materials presented are for the purpose of learning and, by taking this course, students agree that the knowledge and skills gained may not be exploited for malicious purposes.


This course covers:

• An introduction to the Internet of Things (IoT)
• Threat points within the IoT
• The current vulnerabilities that affect the IoT
• Exploiting the relevant threat points
• The UK laws that apply to cybercrimes and to the IoT


You will need:

• An enthusiastic interest in the IoT and cybersecurity
• Some research skills
• Some basic computing and especially cybersecurity knowledge, e.g. IP addresses, port numbers, and communications protocols, such as Bluetooth and WiFi
• Access to the Internet to view online videos and access referenced resources
• Optional for hands-on practice: your own IoT device with relevant analysis tools to try some of the referenced exercises in their own control environment


Course syllabus


Module 1: Introduction to The Internet of Things (IoT)

Module 1 Summary: This module defines the Internet of Things (IoT), discusses some IoT real-world use cases including in the areas of Healthcare, Homes, Transportation, Energy, Wearables and Cities. This module also looks at different IoT protocols, ports, terminologies, and example IoT Architectures.

Module 1 Exercises and Research Tasks:

To complete this module students will be required to answer some questions on several topic areas including on IoT protocols, networking and basic security.


Module 2: Threats, Vulnerabilities, Attacks, and United Kingdom Laws.

Module 2 Summary: In this module, we will review security measures currently employed in the IoT and explore the adequacy or otherwise of these measures. This will form the backdrop for a discussion on the different threat points which can be exploited as part of a cyber-physical security exercise or attack.

Module 2 Exercises and Research Tasks:

To complete this module students will be required to firstly answer two (2) questions: one on IoT security challenges and the other on secure IoT network design. Secondly, the students will be required to answer questions on Laws (UK and in their own current location) that apply to cyber, digital and computer crimes.


Module 3: Cyber-physical attacks on IoT devices – some examples.

Module 3 Summary: This module reviews several IoT-related “attack” exercises. We will look in detail at vulnerabilities and exposures in some IoT devices and discuss how identified vulnerabilities and/or non-secure protocol implementations, etc. in Baby monitors, Fridges and Autonomous Vehicles can be exploited.

The course ends with final exam that will consist of 25 multiple choice and open questions.



 Your Instructor: Edewede Oriwoh (MSc, PhD)

Edewede is a Cyber-security and cyber–physical security expert, a Digital Forensics professional, an Incident Response Specialist, a Guest Speaker, and an Author. She has extensive experience with setting up hacking exercises and is an enthusiastic cyber-security evangelist.

 

Reviews

There are no reviews yet.

Be the first to review “Internet of Things Security (W35)”

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013

Privacy Preference Center

Necessary

Cookies that are necessary for the site to function properly. This includes, storing the user's cookie consent state for the current domain, managing users carts to using the content network, Cloudflare, to identify trusted web traffic. See full Cookies declaration

gdpr, PYPF, woocommerce_cart_hash, woocommerce_items_in_cart, _wp_wocommerce_session, __cfduid [x2],

Performance

These are used to track user interaction and detect potential problems. These help us improve our services by providing analytical data on how users use this site.

_global_lucky_opt_out, _lo_np_, _lo_cid, _lo_uid, _lo_rid, _lo_v, __lotr
_ga, _gid, _gat, __utma, __utmt, __utmb, __utmc, __utmz
vuid

Advertising

Receive our promotional offers and latest news

Newsletter


tr, fr
ads/ga-audiences