Leader in the cybersecurity training sector.

EC-Council IoT Security Essentials (I|SE)

Catégorie
Satisfaction rate
4.9
Success rate
4.9

Description

EC-Council's IoT Security Essentials Series provides comprehensive coverage of essential topics in securing Internet of Things (IoT) systems. From understanding the fundamental concepts of IoT to addressing advanced security threats, students will gain the knowledge and skills necessary to design, deploy, and maintain secure IoT solutions. Through a combination of theoretical learning and hands-on exercises, participants will explore IoT fundamentals,
networking and communication protocols, cloud integration, threat intelligence, incident response, and security engineering principles. Put your newly acquired abilities to the test with an exhilarating Capture the Flag (CTF) Exercise seamlessly integrated in our Capstone project. This CTF is seamlessly integrated by live virtual machines, genuine software, and real networks, all delivered within a secure and regulated sandbox environment. With these exclusive hands-on, human-versus-machine CTF challenges you will develop the hands-on proficiencies essential for success in your cyber professional role. 

Ultimately, students will be equipped with the expertise needed to effectively identify, assess, and mitigate security risks in IoT environments, ensuring the integrity, confidentiality, and availability of IoT systems and data.

Target group

  • School students, graduates, professionals, career starters and changers, IT/Technology/Cybersecurity teams with little or no work experience.
  • Individuals who want to start a career in cybersecurity and are interested in IoT Security.
  • Anyone interested in gaining in-depth knowledge on safeguarding their smart devices or those within their organization.

Training Program

Module 01: IoT Fundamentals
  • Definitions
  • IoT
  • IoT Beginnings
  • The IoT Paradigm
  • IoT Characteristics
  • What's Smart?
  • Smart Technology
  • IoT in Power Grids and Home
  • Internet of Military Things
  • Industrial IoT basics
  • SCADA
  • NIST 800-82 - SCADA
  • DCS
  • Smart City
  • Health IoT
  • IoT Platforms
  • Nodes and Applications in Wireless Sensor Networks
  • The Future of IoT
  • Basic Concepts - MAC Address
  • EUI-64
  • Network Concepts- IP Addresses (IPV4)
  • Private Vs. Public
  • Private IP Address
  • OSI Model - Open Systems Interconnect
  • TCP Model
  • IP Addresses and Subnet Masks
  • IPv4 Subnetting Techniques
  • Custom IP Addresses
  • CIDR
  • IP Address Services
  • APIPA
  • IPv6
  • Network Concepts - Wi-Fi
  • Narrowband, Broadband, and Spread Spectrum Signals
  • Frequency Hopping Vs. Direct Sequence
  • Spread Spectrum Details
  • 802.11 Broadcast Methods
  • 802.11 Channels
  • IoT Protocols
  • Bluetooth
  • ANT+
  • IPv6 Over Low Power Wireless Personal Area Networks (6LowPAN)
  • 6LowPAN
  • NFC
  • RFID
  • ZigBee
  • IEEE 802.15.4 Physical Layer
  • Operating Frequency Bands
  • PHY Frame Structure
  • IEEE 802.15.4 MAC Layer
  • IEEE ZigBee Network Topologies MAC Layer
  • Z Wave
  • LoRa
  • RuBee
  • WirelessHART
  • MiWi
  • MQTT
  • TR-069
  • OMA-DM
  • XMPP
  • DDS
  • Constrained Application Protocol (CoAP)
  • Cellular Networks
  • 5G
  • Windows IoT
  • Power System Communication Technologies
  • Power Line Carrier Communication (PLCC)
  • Tele-Control Protocols
  • IEC-60870-5-101
  • ICCP Protocol
  • IEEE Standards
  • Distributed Network Protocol 3 (DNP3)
  • IEEE IoT Standards List
  • Building Information Model
  • PCB
  • NAND
  • UART
  • JTAG
  • CPU Internal Structure
  • Switches
  • Operating Systems
  • Features of the OS in Embedded Systems
  • Operating System Kernel
  • Kernel Types
  • Firmware
  • Real-Time Operating System (RTOS)
  • Type of Real-Time Systems
  • Performance Evaluation
  • Four Main Tasks of an OS
  • RTOS - VxWorks
  • What is VxWorks?
  • Differences Between Traditional UNIX and VxWorks
  • VxWorks Architecture
  • VXWorks Networking Support
  • RTPS QNX
  • RTOS - LINUX
  • Contiki
  • The Contiki OS
  • Contiki Protothreads and Dynamic Linking
  • RIOT
  • TinyOS
  • MagnetOS
  • FreeRTOS
  • Apache Mynewt
  • BeRTOS
  • Zephyr
  • Linux & Android
  • What is Cloud Computing?
  • NIST
  • Cloud Characteristics
  • Types of Cloud Computing Services
  • Cloud Deployment
  • Basic Cloud Concepts
  • Cloud Computing
  • Cloud Types
  • Multi-cloud
  • HPC Cloud
  • Virtualization
  • Virtual Systems
  • IaaS
  • PaaS
  • SaaS
  • Variations
  • Characteristics of Virtualization
  • Virtual Components
  • Distributed Systems Issues
  • Terms
  • Uses of Cloud Computing
  • IoT Cloud Commercial Solutions
  • AWS IoT
  • AWS IoT Components
  • Oracle Cloud
  • Grid Computing
  • Fog Computing
  • Future Trends
  • IoT Software
  • Web Applications
  • Hybrid Model
  • Embedded Device Web App
  • Web Communications
  • Mobile Applications
  • Hybrid
  • Native Applications
  • IoT Identity Management
  • IoT Protocols
  • What is Machine Learning?
  • IoT and Machine Learning
  • Types of Learning
  • Supervised vs. Unsupervised Learning
  • Classification
  • Neural Networks
  • Terminology
  • Hebb's Rule
  • ANNs - The Basics
  • Topologies of Neural Networks
  • Multi-Layers
  • Recurrent Networks
  • Elman Nets
  • Neural Network Function
  • K-Nearest Neighbor
  • Echo State Network
  • Naive Bayes
  • Block Chain IoT
  • What is a Block?
  • What is a Transaction?
  • Block Chain IoT
  • How to Achieve Convergence?
  • Structure of a Block Chain
  • Consensus Algorithms
  • List of Common IoT Attacks
  • IoT Vulnerable
  • How Bad is the Problem?
  • Mirai
  • BrikerBot
  • Other Notable IoT Attacks
  • Definition of Sybil Attack
  • Sybil Attack
  • Sinkhole Attack
  • TinyOS Beaconing
  • Geographical Attacks and Attackers
  • Spoofed, Altered, or Replayed Routing Info
  • Wormhole Attack
  • Blackhole Attack
  • Rushing Attacks
  • HELLO Flood Attack
  • Smart Heating Shutdown
  • Access Internal State
  • Modify Internal State
  • TAP clone
  • IoT Expands Security Needs
  • OWASP IoT Top 10
  • Dark Reading Top 8 Attacks
  • IoT Attack Surface
  • IoT Goat
  • DHCP Starvation
  • Amplification
  • Other DoS Attacks
  • Bluetooth Attacks
  • Wireless Attacks
  • IoT Hacking
  • IoT Attacks
  • IoT Privacy Issues
  • Malware
  • Virus Types
  • Hiding Techniques
  • Ransomware
  • Smart Thermostat Ransomware
  • Other New Attacks
  • Hacking Medical Devices
  • Hacking Cars
  • Hacking Homes
  • IoT Hacking
  • Metasploit and IoT
  • SCADA - Poor Authentication and Authorization
  • SCADA Unpatched Systems
  • E-passport Threats
  • Security Threats of RFID-Enabled Supply Chain
  • The CIA Triangle
  • Other Security Concepts/Terms
  • Best Practices for Protecting Embedded OSs
  • WLAN Security Goals
  • Basic WLAN Security Mechanisms
  • Open System Authentication
  • Shared Key Authentication
  • WEP
  • WPA
  • WPA2
  • WPA3
  • MAC Address Filtering
  • Disabling SSID Broadcast
  • Changing the Default Login
  • Bluetooth Security Modes
  • Authentication Summary
  • Zigbee Security
  • RuBee Security
  • IoT Checklist
  • IoT Security Measures
  • IoT Security Tools
  • Firmware Security Testing Methodology
  • ByteSweep
  • Stanford Secure IoT project
  • System Hardening
  • Symmetric Block Cipher Algorithms
  • Symmetric Encryption
  • DES & AES
  • Blowfish
  • Asymmetric Encryption
  • How Does Public/Private Key Encryption Work?
  • RSA & Diffie-Helman
  • Digital Signature Basics
  • Hashes
  • What is a Collision?
  • History of SSL
  • TLS v 1.3
  • Remote Access Security - TLS
  • SSL/TLS Handshake
  • Certificate Store
  • Basics of Defending SCADA/ICS
  • SCADA Security Basics
  • SCADA Security Standards
  • RTU Security - Serial Port
  • Current Grid Environment
  • Threats to the Grid
  • NISTIR 7628
  • Medical Device Standards
  • EMC Terminology
  • IoT Privacy
  • IoT Security Compliance Framework 1.1
  • Industrial IoT Security Framework
  • IETF
  • NIST
  • NISTIR 8228
  • IEEE Standards
  • Security in the SDLC
  • Legal, Regulatory, and Rights Issues
  • Aircrack
  • Wireless tools
  • Other Wifi tools
  • Bluetooth tools
  • Security Protocols For Wireless Sensor Networks
  • SNEP: Sensor Network Encryption Protocol
  • TINYSEC
  • MINISisEC
  • LEAP: Localized Encryption And Authentication Protocol
  • ZigBee Security
  • ZigBee Security Trust Center
  • ZIGBEE
  • State of Cloud Security
  • Cloud Threats On the Rise
  • Cloud Vulnerabilities
  • Issues
  • Critical Security Areas in Cloud Computing (CSA)
  • Top 10 Customer Issues Eroding Cloud Confidence (from CSA)
  • Privileged Access
  • Data Segregation
  • Cloud Security Alliance - Guidance
  • CloudAudit & the A6 Deliverable
  • ISO 27017
  • ISO 27018
  • NSA Guidance
  • Cloud Computing Attacks
  • Man in the Cloud
  • Cloudbleed
  • Secure Cloud Computing
  • Infrastructure Security
  • Compliance
  • Cloud Computing Also Relies on the Security of Virtualization
  • Sample Hypervisor Security Issues
  • Security Issues
  • Virtualization Security Guidance
  • Cloud Provider Employees
  • Mobile Cloud
  • MRI
  • Privacy & Personal Information
  • U.S. Privacy Law
  • GDPR
  • Cloud Security Policies
  • Procedures, Standards, and Guidelines
  • Policy Types
  • Investigative Support
  • Forensic Issues
  • National Vulnerability Database
  • US Cert
  • Shodan
  • IoT Sploit
  • Alien Vault
  • Threat Crowd
  • Phishtank
  • STRIDE
  • DREAD
  • PASTA
  • CVSS
  • Common Vulnerability Exposure (CVE)
  • Risk Determinations
  • Risk Assessment Standards
  • Addressing Risk
  • Residual Risk
  • Find Web Cams
  • Web Cams Default passwords
  • NIST 800-115
  • NIST 800-53 A
  • National Security Agency (NSA) Information Assessment Methodology (IAM)
  • NSA-IAM Overview
  • IAM
  • PCI Penetration Testing standard
  • PCI Highlights
  • PTES
  • Cyber Kill Chain
  • CEH Lifecycle
  • Vulnerability
  • TCPdump
  • FLAGS
  • Packet Flags
  • Nmap
  •  NMAP Flags
  • Standards
  • Processes
  • Procedures
  • Impact
  • IoT and the Cloud
  • Indicators of Compromise
  • Tools
  • Forensic Tools
  • Methodologies
  • 12 Practices
  • Threat Modeling
  • Dread
  • Stride

Goal

The IoT Security Essentials (I|SE) course provides foundational knowledge and skills to secure Internet of Things (IoT) devices and networks.

  • Gain insights into the emergence of the Internet of Things (IoT).
  • Learn about the devices that make your home a smart home.
  • Dive deep into IoT communication models.
  • Gain a deep understanding of IoT networking and communication.
  • Understand cloud computing in depth.
  • Learn about the different types of threats to IoT.

Recommended

No prior cybersecurity knowledge or IT work experience required.

Book Now

Important information:

Our courses are not registered with the Répertoire National des Certifications Professionnelles (RNCP), but they do comply with the requirements of the Répertoire Spécifique (RS).

Réserver l’événement

icône Form/calendar icon
icône Form/ticket icon
icône Form/up small icon icône Form/down small icon
Billets disponibles: Illimité
Le billet de "" est épuisé. Vous pouvez essayer un autre billet ou une autre date.

We use cookies to improve your experience. See our Cookie policy and our Privacy policy.

Information request

I would like more information about your training courses

ACG Cyberacademy collects and uses the data provided via this form in order to process your registration requests. Fields marked with an * are required. The other information enables us to optimise the follow-up of your request and the quality of our customer relations.