Lesson 1.2 - Fundamentals of IoT Security
Lesson 1.3 - Understanding IoT Security Challenges
Lesson 1.4 - Applying security standards and best practices
Lesson 1.5 - Ensuring Data Privacy and Compliance with Regulations
Lab 1.1 Setup an IoT Device
Lab 1.2 Analyze real world IoT security challenges and case studies
Lab 1.3 Create a checklist for ensuring IoT security
Lab 1.4 Develop a compliance plan for IoT projects
Module 1 - Knowledge Check
Lesson 2.2 - Designing a holistic security framework for IoT
Lesson 2.3 - Identifying potential Vulnerabilities and Risks
Lesson 2.4 - IoT Security by Design Principles
Lab 2.1 Design a security architecture for an IoT ecosystem
Lab 2.2 Define roles and responsibilities in the Security Architecture
Lab 2.3 Identify potential Vulnerabilities and Risks
Module 2 - Knowledge Check
Lesson 3.2 - Securing IoT Hardware Components
Lesson 3.3 - Implementing Hardware-Based Security Solutions in IoT Devices
Lesson 3.4 - Identifying and categorizing IoT assets
Lesson 3.5 - Managing Access to IoT Assets
Lesson 3.6 - User and Device Authentication in IoT
Lab 3.1 Implement Hardware
Lab 3.2 Identify IoT assets within a network
Lab 3.3 Asset Categorization Based on Importance and Criticality
Lab 3.4 Set up access controls for IoT assets
Lab 3.5 Implement User and Device Authentication Mechanisms
Module 3 - Knowledge Check
Lesson 4.2 - Methods for encrypting data in transit and at rest
Lesson 4.3 - Data Integrity and Confidentiality
Lesson 4.4 - Techniques to Maintain Data Integrity and Confidentiality in IoT
Lesson 4.5 - Handling sensitive data in IoT environments
Lab 4.1 Implement data encryption techniques for data in transit and at rest
Lab 4.2 Explore methods to maintain data integrity and confidentiality
Lab 4.3 Develop Strategies to handle sensitive data in IoT Environment
Module 4 - Knowledge Check
Lesson 5.2 - IoT Network Architecture and Segmentation
Lesson 5.3 - Protecting IoT networks from Cyber Threats
Lesson 5.4 - Secure Network Design Considerations
Lesson 5.5 - Intrusion Detection and Prevention
Lesson 5.6 - Detecting and responding to IoT network breaches
Lab 5.1 Configure security features on IoT devices
Lab 5.2 Set up VLANs and Subnets for network isolation
Lab 5.3 Configure firewalls and intrusion detection systems for IoT networks
Module 5 - Knowledge Check
Lesson 6.2 - Securing Cloud-Based IoT Services
Lesson 6.3 - Protecting cloud-hosted IoT platforms.docx
Lesson 6.4 - IoT application and platform security
Lesson 6.5 - Patch management and vulnerability assessment
Lesson 6.6 - Implementing Fallback Mechanisms in IoT Security
Lesson 6.7 - Integrating Security from the outset in IoT projects.docx
Lab 6.1 Set up firewall rules to control traffic between IoT devices and the internet
Lab 6.2 Set up Identity and Access Management for cloud
Lab 6.3 Control access to IoT platforms and applications
Lab 6.4 Encrypt data in transit and at rest in cloud environments
Lab 6.5 Develop a patch management plan for IoT systems
Lab 6.6 Create and test fallback mechanisms for IoT applications
Lab 6.7 Developing an IoT Specific Incident Management Plan
Lab 6.8 Simulate IoT related security incidents and practice response procedures
Module 6 - Knowledge Check