Securing IoT – Build secure IoT solutions: 2-in-1
Securing IoT – Build secure IoT solutions: 2-in-1, available at $44.99, has an average rating of 3.5, with 44 lectures, 2 quizzes, based on 50 reviews, and has 369 subscribers.
You will learn about Build secure Internet of Things (IoT) systems. Learn from common IoT use cases across Industries for connected vehicles, microgrids and enterprise drone systems Adopt a real-world threat model for IoT systems and identify top priority risks In-depth coverage of privacy challenges and mitigations for the IoT Integrate cryptographic modules in IoT systems Explore securing connecting to the cloud, processing and storing data in the cloud, and integrating cloud security services for your IoT system This course is ideal for individuals who are This Learning Path is for IoT product designers, for IOT product managers, IT security professionals and security engineers who would like to ensure the security of their organizations data and IoT systems through design techniques, applied cryptography and secure cloud connectivity. It is particularly useful for This Learning Path is for IoT product designers, for IOT product managers, IT security professionals and security engineers who would like to ensure the security of their organizations data and IoT systems through design techniques, applied cryptography and secure cloud connectivity.
Enroll now: Securing IoT – Build secure IoT solutions: 2-in-1
Summary
Title: Securing IoT – Build secure IoT solutions: 2-in-1
Price: $44.99
Average Rating: 3.5
Number of Lectures: 44
Number of Quizzes: 2
Number of Published Lectures: 44
Number of Published Quizzes: 2
Number of Curriculum Items: 46
Number of Published Curriculum Objects: 46
Original Price: $199.99
Quality Status: approved
Status: Live
What You Will Learn
- Build secure Internet of Things (IoT) systems.
- Learn from common IoT use cases across Industries for connected vehicles, microgrids and enterprise drone systems
- Adopt a real-world threat model for IoT systems and identify top priority risks
- In-depth coverage of privacy challenges and mitigations for the IoT
- Integrate cryptographic modules in IoT systems
- Explore securing connecting to the cloud, processing and storing data in the cloud, and integrating cloud security services for your IoT system
Who Should Attend
- This Learning Path is for IoT product designers, for IOT product managers, IT security professionals and security engineers who would like to ensure the security of their organizations data and IoT systems through design techniques, applied cryptography and secure cloud connectivity.
Target Audiences
- This Learning Path is for IoT product designers, for IOT product managers, IT security professionals and security engineers who would like to ensure the security of their organizations data and IoT systems through design techniques, applied cryptography and secure cloud connectivity.
The internet of things (IoT) is a rapidly growing technology which aims at connecting all devices to the existing internet infrastructure. It is the network of items, which enables various objects to collect and exchange data with the help of internet. As IoT creeps into every aspect of our existence, many security risks arise and the network that may just connect the home could pose a threat to the user if compromised. To protect your IoT systems and the security of your users, you’ll need to know some solid IoT security best practices.
This comprehensive 2-in-1 course takes a detailed, step-by-step approach to security engineering for IoT through cryptographic solutions, identity, access management solutions and key management solutions for IoT systems. You’ll learn through practical demonstrations of case studies, clear explanations, and interesting real-world applications. It will give you a versatile range of IoT skills, which you will put to work in building and securing your own Internet of Things (IoT) systems.
This training program includes 2 complete courses, carefully chosen to give you the most comprehensive training possible.
The first course, Fundamentals of IoT Security, starts off with covering the fundamentals of IoT. You will then review use cases across various industries and understand common IoT components and technologies to provide a baseline understanding of the systems and devices that you need to protect. You will also review common security architectures that can be applied to IoT systems, and learn regulations and standards that apply to securing IoT systems. Next, you will explore IOT components such as the IoT (hardware, real-time operating systems (RTOS), Application Programming Interfaces (APIs), messaging and communication protocols, and backend services. You will understand threats to IoT systems, attack vectors, current security regulations and standards, and common security architectures. Further, you will examine Privacy by Design (PbD) principles and walk through an example on Privacy Impact Assessment (PIA).
The second course, Security Engineering for the IoT, starts off with explaining approaches for securely designing and hardening IoT endpoints and systems. You will then learn how to implement a secure system design methodology within an organization. You will also examine what is required to securely design an IoT device, how to integrate your existing security services to protect an IoT system, how to select technologies that support your security endeavors, and negotiating security agreements with the IoT providers. Next, you will gain in-depth knowledge of the approaches for applying cryptographic solutions, identity and access management solutions, and key management solutions to the IoT systems. You will explore a case study on the connected vehicle market to identify its management approach and understand how biometrics play an interesting role in securing IoT devices. Finally, you will learn how to securely connect to the cloud, process and store data in the cloud, and integrate cloud security services for your IoT system.
By the end of this Learning Path, you will learn to identify threats of your organization’s data and your own IoT systems and will secure them with the help of design techniques, applied cryptography, and secure cloud connectivity.
Meet Your Expert(s):
We have the best work of the following esteemed author(s) to ensure that your learning journey is smooth:
- Brian Russell is a chief engineer focused on cyber security solutions for Leidos. He oversees the design and development of security solutions and the implementation of privacy and trust controls for customers, with a focus on securing Internet of Things (IoT). He leads efforts that include security engineering for Unmanned Aircraft Systems (UAS) and connected vehicles and development security systems, including high assurance cryptographic key management systems. He has 16 years of information security experience. He serves as chair of the Cloud Security Alliance (CSA) Internet of Things (IoT) Working Group, and as a member of the Federal Communications Commission (FCC) Technological Advisory Council (TAC) Cybersecurity Working Group. Brian also volunteers in support of the Center for Internet Security (CIS) 20 Critical Security Controls Editorial Panel and the Securing Smart Cities (SSC) Initiative.
Course Curriculum
Chapter 1: Fundamentals of IoT Security
Lecture 1: The Course Overview
Lecture 2: Case Study: Connected and Self-driving Vehicles
Lecture 3: Case Study: Microgrids
Lecture 4: Case Study: Smart City Drone Systems
Lecture 5: IoT Hardware and Software
Lecture 6: IoT Communication and Messaging Protocols
Lecture 7: IoT Interfaces and Services
Lecture 8: Threats, Vulnerabilities and Risks
Lecture 9: Case Study: The Mirai Botnet Opens up Pandora's Box
Lecture 10: Today's Attack Vectors
Lecture 11: Current IoT Security Regulations
Lecture 12: Current IoT Privacy Regulations
Lecture 13: An Introduction to IoT Security Architectures
Lecture 14: What is Threat Modeling
Lecture 15: Identifying Assets
Lecture 16: Creating a System Architecture
Lecture 17: Documenting Threats
Lecture 18: Rating Threats
Lecture 19: IoT Privacy Concerns
Lecture 20: Privacy by Design (PbD)
Lecture 21: Conducting a Privacy Impact Assessment (PIA)
Lecture 22: Case Study: The Connected Barbie
Chapter 2: Security Engineering for the IoT
Lecture 1: The Course Overview
Lecture 2: Secure IoT System Design
Lecture 3: Security System Integration for the IoT
Lecture 4: Integrating Safety into the Design Process
Lecture 5: Processes and Agreements
Lecture 6: Technology Selection
Lecture 7: Fundamentals of Cryptography
Lecture 8: Cryptographic Modules
Lecture 9: Cryptographic Key Management
Lecture 10: Implementing Cryptography Within the IoT
Lecture 11: Case Study: New Approaches – Blockchain for the IoT
Lecture 12: The Device Identity Lifecycle
Lecture 13: In Depth: The Bootstrap Process
Lecture 14: Case Study: Connected Vehicles
Lecture 15: IAM Infrastructure
Lecture 16: Authorization and Access Control
Lecture 17: New Approaches: Applying Biometrics
Lecture 18: Introduction to Cloud Services for the IoT
Lecture 19: Cloud Security Architecture – Microsoft Azure
Lecture 20: Cloud Security Architecture – Amazon Web Services
Lecture 21: Cloud Security Architecture – IBM Watson IoT Platform
Lecture 22: Hands-on: Connect an IoT Device to Amazon Web Services
Instructors
-
Packt Publishing
Tech Knowledge in Motion
Rating Distribution
- 1 stars: 5 votes
- 2 stars: 3 votes
- 3 stars: 18 votes
- 4 stars: 11 votes
- 5 stars: 13 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Top 10 Language Learning Courses to Learn in November 2024
- Top 10 Video Editing Courses to Learn in November 2024
- Top 10 Music Production Courses to Learn in November 2024
- Top 10 Animation Courses to Learn in November 2024
- Top 10 Digital Illustration Courses to Learn in November 2024
- Top 10 Renewable Energy Courses to Learn in November 2024
- Top 10 Sustainable Living Courses to Learn in November 2024
- Top 10 Ethical AI Courses to Learn in November 2024
- Top 10 Cybersecurity Fundamentals Courses to Learn in November 2024
- Top 10 Smart Home Technology Courses to Learn in November 2024
- Top 10 Holistic Health Courses to Learn in November 2024
- Top 10 Nutrition And Diet Planning Courses to Learn in November 2024
- Top 10 Yoga Instruction Courses to Learn in November 2024
- Top 10 Stress Management Courses to Learn in November 2024
- Top 10 Mindfulness Meditation Courses to Learn in November 2024
- Top 10 Life Coaching Courses to Learn in November 2024
- Top 10 Career Development Courses to Learn in November 2024
- Top 10 Relationship Building Courses to Learn in November 2024
- Top 10 Parenting Skills Courses to Learn in November 2024
- Top 10 Home Improvement Courses to Learn in November 2024