1 Introduction IoT-Security
- IoT security vs. cyber security
- Consumer vs. industrial IoT devices
- Why IoT security is important
- How do organizations approach the topic of IoT security?
- Principles of IoT Security
- Emerging technologies for IoT security
- IoT Security
2 Overview of IoT technologies
- IoT: Historical Background
- Evolution of IoT Technologies
- Cyber-physical systems
- Emerging IoT Technologies
- IoT technologies: risks vs. opportunities
3 Understanding the IoT ecosystem
- The lifecycle of IoT devices
- IoT architectures
- Elements of an IoT ecosystem
4 Risks and issues in the IoT space
- Challenges
- Threats
- Vulnerabilities
- Attacks
5 Designing IoT security concepts
- IoT security and IoT systems (life cycle)
- Security for IoT development
- Security for IoT implementation
- Evolving guidelines and standards
6 IoT Security: technical measures
- Hardware security
- Software and firmware security
- Sensors
- Interfaces
- Network Security
- Protocols
- Cloud and web-based elements
7 Identity and Access Management (IAM)
- IAM Basics
- Designing an effective IAM infrastructure
- Designing secure authentication methods
- Design effective authorization mechanisms
8 Implement an IoT security strategy
- Develop and enforce strategies, policies, processes and procedures
- Assessing and managing risk
- Managing suppliers and third-party vendors
- Continuous monitoring and analysis
- Security Awareness
- Incident management
- Security Audits
- Penetration Testing