Course Outline

Introduction to IoT Security

Overview of IoT Technologies

Understanding the Basic IoT Architecture

Understanding Major Security Risks and Issues in IoT

  • IoT Vulnerabilities
  • IoT Security Challenges
  • Building Awareness of Attacks in IoT

Exploring Domain-Specific IoT Architectures

  • eHealth IoT Security Architecture
  • Industrial IoT Security Architecture

Security Architectures of Proximity Network Services

  • Wi-Fi
  • BLE
  • SigFox
  • LoRaWAN
  • NB-IoT

Designing Security into IoT

  • IoT Authentication and Authorization
  • IoT Data Integrity
  • IoT Security Standards
  • Architecting IoT Security Domains
  • Using IoT Services

Working with Technologies for IoT Security

  • IoT Network Security
    • Bayshore Networks
    • Cisco
    • Darktrace
    • Senrio
  • IoT Authentication
    • Baimos Technologies
    • Covisint
    • Device Authority
    • Entrust Datacard
    • Gemalto
  • IoT Encryption
    • Cisco
    • Entrust Datacard
    • Gemalto
    • HPE
    • Lynx Software Technologies
    • Symantec
  • IoT PKI
    • DigiCert
    • Entrust Datacard
    • Gemalto
    • HPE
    • Symantec
    • WISeKey
  • IoT Security Analytics
    • Cisco
    • Indegy
    • Kaspersky Lab
    • SAP
    • Senrio
  • IoT API Security
    • Akana
    • Apigee/Google
    • Axway
    • CA Technologies
    • Mashery/TIBCO
    • MuleSoft
    • WSO2

Updating Your Organization's IoT Architecture for Security

Choosing the Right IoT Security Technologies for Your Organization

Summary and Conclusion

Requirements

  • General familiarity with IoT

Audience

  • IT Professionals
  • Developers
  • Engineers
  • Managers
 14 Hours

Number of participants



Price per participant

Testimonials (2)

Related Categories