Course Outline
Introduction to IoT Security
Overview of IoT Technologies
Understanding the Basic IoT Architecture
Understanding Major Security Risks and Issues in IoT
- IoT Vulnerabilities
- IoT Security Challenges
- Building Awareness of Attacks in IoT
Exploring Domain-Specific IoT Architectures
- eHealth IoT Security Architecture
- Industrial IoT Security Architecture
Security Architectures of Proximity Network Services
- Wi-Fi
- BLE
- SigFox
- LoRaWAN
- NB-IoT
Designing Security into IoT
- IoT Authentication and Authorization
- IoT Data Integrity
- IoT Security Standards
- Architecting IoT Security Domains
- Using IoT Services
Working with Technologies for IoT Security
- IoT Network Security
- Bayshore Networks
- Cisco
- Darktrace
- Senrio
- IoT Authentication
- Baimos Technologies
- Covisint
- Device Authority
- Entrust Datacard
- Gemalto
- IoT Encryption
- Cisco
- Entrust Datacard
- Gemalto
- HPE
- Lynx Software Technologies
- Symantec
- IoT PKI
- DigiCert
- Entrust Datacard
- Gemalto
- HPE
- Symantec
- WISeKey
- IoT Security Analytics
- Cisco
- Indegy
- Kaspersky Lab
- SAP
- Senrio
- IoT API Security
- Akana
- Apigee/Google
- Axway
- CA Technologies
- Mashery/TIBCO
- MuleSoft
- WSO2
Updating Your Organization's IoT Architecture for Security
Choosing the Right IoT Security Technologies for Your Organization
Summary and Conclusion
Requirements
- General familiarity with IoT
Audience
- IT Professionals
- Developers
- Engineers
- Managers
Delivery Options
Private Group Training
Our identity is rooted in delivering exactly what our clients need.
- Pre-course call with your trainer
- Customisation of the learning experience to achieve your goals -
- Bespoke outlines
- Practical hands-on exercises containing data / scenarios recognisable to the learners
- Training scheduled on a date of your choice
- Delivered online, onsite/classroom or hybrid by experts sharing real world experience
Private Group Prices RRP from €4560 online delivery, based on a group of 2 delegates, €1440 per additional delegate (excludes any certification / exam costs). We recommend a maximum group size of 12 for most learning events.
Contact us for an exact quote and to hear our latest promotions
Public Training
Please see our public courses
Testimonials (3)
Very knowledgeable trainer, was able to adjust to audience knowledge, excellent industry experience and ability to relate to audience needs Excellent content preparation , tailored to needs discussed beforehand. Good supplement reading materials prepared by trainer
Oliver Steinig - Bosch
Course - IoT Security Architecture
Level of expertise from the trainer Use case examples
Pierre Maillot - Bosch
Course - IoT Security Architecture
Ann is very knowledgeable on the subject. She is constantly varying pace according to the feedback. There is a lot of room for discussing attendee's own experiences. It was a great joy !.