© 2023 Ethical Hackers Academy
Master in IOT Security
In this tutorial we will provide you with detailed instructions on how to use WordPress to create and manage your site. WordPress can be used for both simple and complex websites. In our WordPress tutorial we have tried to cover all the basics and few advanced topics.
The intention of this course is to understand the vulnerability of the Internet of Things (IoT) devices. IoT is the interconnection of wide variety devices using the internet, these devices include such things as heart monitors, smart thermostats, biometric devices for farm animals, etc.
Gartner Inc, has stated that they believe there will be 26 billion IoT devices on the internet by 2020.
The course will consist of the following:
1. Overview of IoT technology and services (15%) – Assignments to demonstrate learning
2. Networking for IoT (15%) – Assignments to demonstrate learning
3. Current Security and Privacy for IoT (15%) – Assignments to demonstrate learning
4. Future Security concepts and solutions (15%) – Assignment to demonstrate learning
5. Final Project (40%) – In-depth analysis of a particular subset of IoT, for example, connectivity for cars, the problems that this presents and what solutions are available now and in the future.
There will be an optional lab portion to the course which could work best as a portion of your final project. It is recommended that you use Raspberry Pi’s or Arduino devices. There are several small projects currently online with plans on how to build them; they are mostly monitoring devices for the home that can be connected to the internet. The intention is to build one or two of these projects and utilize different tools from Kali Linux to determine their vulnerabilities.
1. Introduction to the Internet of Things
I. Introduction to Security of the Internet of Things;
II. IoT Sectors and Devices;
III. Basic Networking Overview;
IV. Data Use and Storage;
V. Energy Use;
VI. IoT Privacy;
VII. Conclusion; and
VIII. Homework # 1.
2. Networking for the Internet of Things
I. Introduction and Scenario;
V. Messaging Protocols;
VI. Physical Connectivity Comparison;
VII. Connecting the Network;
VIII. Conclusion; and
IX. Homework # 2.
3. Current Security and Privacy Issues for IoT
I. Introduction and Breach Scenario;
II. Password Complexity;
III. Account Enumeration;
IV. Secure Communication;
V. Hardware / Over the Air (OTA) Upgrades;
VI. Cloud Server Security;
VII. IoT Privacy;
VIII. Ethics of IoT System Protection;
IX. IoT Legal Issues;
XI. Conclusion; and
XII. Homework # 3.
4. Future Security and Privacy Issues for IoT
II. Privacy by Design;
III. Security by Design;
IV. Threat Monitoring;
V. Trusted Resources;
VI. Physical Security;
VII. The Human Factor;
VIII. Conclusion; and
IX. Homework # 4.
5. Final Project.
18 Lectures and 4 Hours
Full lifetime access
Access on mobile and TV
Certificate of Completion