Table of Contents
  

Module 1: Fundamentals of IoT Security 

AN INTRODUCTION TO IOT SYSTEMS AND TECHNOLOGIES

  • The Course Overview
  • Case Study: Connected and Self-driving Vehicles
  • Case Study: Microgrids
  • Case Study: Smart City Drone Systems
  • IoT Hardware and Software
  • IoT Communication and Messaging Protocols
  • IoT Interfaces and Services

AN INTRODUCTION TO IOT SECURITY

  • Threats, Vulnerabilities and Risks
  • Case Study: The Mirai Botnet Opens up Pandora’s Box
  • Today’s Attack Vectors
  • Current IoT Security Regulations
  • Current IoT Privacy Regulations
  • An Introduction to IoT Security Architectures

CONDUCTING AN IOT THREAT MODEL

  • What is Threat Modeling
  • Identifying Assets
  • Creating a System Architecture
  • Documenting Threats
  • Rating Threats

DEEP DIVE ON PRIVACY

  • IoT Privacy Concerns
  • Privacy by Design (PbD)
  • Conducting a Privacy Impact Assessment (PIA)
  • Case Study: The Connected Barbie

Module 2: Security Engineering for the IoT

SECURELY DESIGNING IOT THINGS AND SYSTEMS

  • The Course Overview
  • Secure IoT System Design
  • Security System Integration for the IoT
  • Integrating Safety into the Design Process
  • Processes and Agreements
  • Technology Selection

CRYPTOGRAPHIC APPROACHES FOR THE IOT

  • Fundamentals of Cryptography
  • Cryptographic Modules
  • Cryptographic Key Management
  • Implementing Cryptography Within the IoT
  • Case Study: New Approaches – Blockchain for the IoT

IDENTITY AND ACCESS MANAGEMENT FOR THE IOT

  • The Device Identity Lifecycle
  • In Depth: The Bootstrap Process
  • Case Study: Connected Vehicles
  • IAM Infrastructure
  • Authorization and Access Control
  • New Approaches: Applying Biometrics

SECURE CONNECTIONS TO THE CLOUD

  • Introduction to Cloud Services for the IoT
  • Cloud Security Architecture – Microsoft Azure
  • Cloud Security Architecture – Amazon Web Services
  • Cloud Security Architecture – IBM Watson IoT Platform