The Internet of Things which makes our every day devices which were previously closed systems open for remote access and control, security comes in as a biggest threat than ever before. These devices not only show up at our home and personal surrounding, they are coming up at the corporate office for use in conference rooms, executive suites, and even as a low-cost building security camera system. So we can understand the threats are much more than what our 25 years of web security experience can handle. This time the stakes are highers so the measures also have to be greater.
But we need to keep in mind that the benefits of IoT should not exceed their risks. The industry belives now that there is no silver bullet which can mitigate the threats. Security should be at core of any IoT product or service design.
Join this course and understand different security threats and their cure at differnt levels in your IoT architecture and put the learning into your core design for creating secure products.
The main objective of this course is to train you to bring Security into your IoT design and make you aware of possible threats which your IoT design can face. After teaching more than 500 professionals and IoT enthusiasts in the Beginner's IoT course in less than six months and putting together our expertise in IoT and our Security first approach, Frugal Labs have come up with this course which totally focuses on IoT Security in your architecture.
This course will be taught and guided by the core team of Frugal Labs experienced of IoT and Data Sciences.
This course will be held over the period of 4 weeks, and will include:
Each video module is pre-taped, enabling you to complete it any time before the assigned due date. While you may complete all the assignments in rapid succession, most participants find it beneficial to adhere to the weekly schedule and participate in online discussion forums along the way. There are approximately two-three hours of video every week and you will likely spend an average of four to six hours a week on course-related activities.
A ticket based support system is available on which the participant can raise his or her doubts which will be resolved using email/phone and video call (Skype or Hangout) which ever will be suitable.
|Need of IoT Security|
|Requirement and Basic Properties , Main Challenges, Confidentiality, Integrity, Availability, Non-Repudiation|
|Device - device, Device - Cloud, Device - Gateway, Gateway - Cloud, Cloud – Backend - Applications|
|Security Classification & Access Control|
|Data classification (Public and Private), Privacy issues in IoT, IoT Authentication and Authorization, IoT Data Integrity|
|Web Based Attacks and Implementation in IoT|
|Denial of Service, Sniffing, Phishing, DNS Hijacking, Pharming, Defacement etc.|
|Cipher||Symmetric Key Algorithms (AES and DES), Asymmetric Key Algorithm(RSA)|
|Attacks||Dictionary and Brute Force, Lookup Tables, Reverse Lookup Tables, Rainbow Tables|
|Hashing||MD5, SHA256, SHA512, RipeMD, and WHIRLPOOL, Salt , Best practices|
|Attack Surface in IoT and Threat Assessment|
|Embedded device||UART, SPI, I2C, JTAG|
|Software and Cloud Components||Firmware of the evice, Web Application Dashboard , Mobile Application Used to Control, Configure and Monitor the Devices|
|Radio Communication||WiFi, BLE, Cellular, Zigbee*, ZWave*, 6LoWPAN|
|IoT Protocol Inbuilt Security Features|
|On Transport Layer: SSL/TLS and DTLS, On Application Layer: MQTT, CoAP, XMPP, AMQP|
|Identity and Access Management, Key Management|
|Model Discussions Along with Use Cases|
|Smart Home, Smart Agriculture, Smart Retail Supply, Smart Healthcare, Smart Grid*, Smart Cities*|
Participants should have working knowledge of :
If the above conditions are not met, it is recommended that you join our Beginner's IoT Course first, or continue at your own expense.
How to register and pay?
How will I get my kit?
How to solve my doubts during the course?
What if I am not able to complete the course in designated time frame?
Do I get a certificate?