Ansys|91国内精品视频|Matlab|91国内精品久久久|R语言培训课程班-91国内精品久久-曙海培训深圳成都南京苏州杭州

課程目錄:IoT Security 培訓
4401 人關注
(78637/99817)
課程大綱:

         IoT Security 培訓

 

 

Session 1 & 2: Basic and Advanced concepts of IoT architecture from security perspective
A brief history of evolution of IoT technologies
Data models in IoT system – definition and architecture of sensors, actuators, device, gateway, communication protocols
Third party devices and risk associated with vendors supply chain
Technology ecosystem – device providers, gateway providers, analytics providers, platform providers, system integrator -risk associated with all the providers
Edge driven distributed IoT vs Cloud driven central IoT : Advantage vs risk assessment
Management layers in IoT system – Fleet management, asset management, Onboarding/Deboarding of sensors , Digital Twins. Risk of Authorizations in management layers
Demo of IoT management systems- AWS, Microsoft Azure and Other Fleet managers
Introduction to popular IoT communication protocols – Zigbee/NB-IoT/5G/LORA/Witespec – review of vulnerability in communication protocol layers
Understanding the entire Technology stack of IoT with a review of Risk management
Session 3: A check-list of all risks and security issues in IoT
Firmware Patching- the soft belly of IoT
Detailed review of security of IoT communication protocols- Transport layers ( NB-IoT, 4G, 5G, LORA, Zigbee etc. ) and Application Layers – MQTT, Web Socket etc.
Vulnerability of API end points -list of all possible API in IoT architecture
Vulnerability of Gate way devices and Services
Vulnerability of connected sensors -Gateway communication
Vulnerability of Gateway- Server communication
Vulnerability of Cloud Database services in IoT
Vulnerability of Application Layers
Vulnerability of Gateway management service- Local and Cloud based
Risk of log management in edge and non-edge architecture
Session 4: OSASP Model of IoT security , Top 10 security risk
I1 Insecure Web Interface
I2 Insufficient Authentication/Authorization
I3 Insecure Network Services
I4 Lack of Transport Encryption
I5 Privacy Concerns
I6 Insecure Cloud Interface
I7 Insecure Mobile Interface
I8 Insufficient Security Configurability
I9 Insecure Software/Firmware
I10 Poor Physical Security
Session 5: Review and Demo of AWS-IoT and Azure IoT security principle
Microsoft Threat Model – STRIDE
Details of STRIDE Model
Security device and gateway and server communication – Asymmetric encryption
X.509 certification for Public key distribution
SAS Keys
Bulk OTA risks and techniques
API security for application portals
Deactivation and delinking of rogue device from the system
Vulnerability of AWS/Azure Security principles
Session 6: Review of evolving NIST standards/recommendation for IoT
Review of NISTIR 8228 standard for IoT security -30 point risk consideration Model
Third party device integration and identification
Service identification & tracking
Hardware identification & tracking
Communication session identification
Management transaction identification and logging
Log management and tracking
Session 7: Securing Firmware/ Device
Securing debugging mode in a Firmware
Physical Security of hardware
Hardware cryptography – PUF ( Physically Unclonable Function) -securing EPROM
Public PUF, PPUF
Nano PUF
Known classification of Malwares in Firmware ( 18 families according to YARA rule )
Study of some of the popular Firmware Malware -MIRAI, BrickerBot, GoScanSSH, Hydra etc.
Session 8: Case Studies of IoT Attacks
Oct. 21, 2016, a huge DDoS attack was deployed against Dyn DNS servers and shut down many web services including Twitter . Hackers exploited default passwords and user names of webcams and other IoT devices, and installed the Mirai botnet on compromised IoT devices. This attack will be studied in detail
IP cameras can be hacked through buffer overflow attacks
Philips Hue lightbulbs were hacked through its ZigBee link protocol
SQL injection attacks were effective against Belkin IoT devices
Cross-site scripting (XSS) attacks that exploited the Belkin WeMo app and access data and resources that the app can access
Session 9: Securing Distributed IoT via Distributer Ledger – BlockChain and DAG (IOTA) [3 hours]
Distributed ledger technology– DAG Ledger, Hyper Ledger, BlockChain
PoW, PoS, Tangle – a comparison of the methods of consensus
Difference between Blockchain, DAG and Hyperledger – a comparison of their working vs performance vs decentralization
Real Time, offline performance of the different DLT system
P2P network, Private and Public Key- basic concepts
How ledger system is implemented practically- review of some research architecture
IOTA and Tangle- DLT for IoT
Some practical application examples from smart city, smart machines, smart cars
Session 10: The best practice architecture for IoT security
Tracking and identifying all the services in Gateways
Never use MAC address- use package id instead
Use identification hierarchy for devices- board ID, Device ID and package ID
Structure the Firmware Patching to perimeter and conforming to service ID
PUF for EPROM
Secure the risks of IoT management portals/applications by two layers of authentication
Secure all API- Define API testing and API management
Identification and integration of same security principle in Logistic Supply Chain
Minimize Patch vulnerability of IoT communication Protocols
Session 11: Drafting IoT security Policy for your organization
Define the lexicon of IoT security / Tensions
Suggest the best practice for authentication, identification, authorization
Identification and ranking of Critical Assets
Identification of perimeters and isolation for application
Policy for securing critical assets, critical information and privacy data

主站蜘蛛池模板: 扭力扳手_扭力扳手检定仪_数显扭力扳手_扭力测试仪_测力计_推拉力计_拉力测试仪_测试台架-上海实干实业有限公司 | 吉林人才网_吉林招聘网_求职找工作平台 | 联系我们果博东方公司福布斯客服电话 | 淘客联盟平台_网络电话系统-河南英邦软件科技有限公司官网 | 拉力试验机|电子万能试验机|液压万能试验机|摩擦磨损试验机|济南试验机厂家-济南思达测试技术有限公司 | 康明斯柴油发电机厂家-康明斯发电机(深圳)有限公司 | 诸城市佳品食品机械有限公司| 喷雾式干燥机-真空桨叶干燥机-桨叶干燥器-常州力马干燥科技有限公司 | 上海钧尚电器有限公司 - Faulhaber电机 AMETEK pittman电机 AMETEK ROTRON军用航空风机 Exlar电动缸 MAE电机 MCG电机 CP电动工具 马头工具 AMCI驱动器 直流电机 减速箱 直流伺服电机,无刷电机,直线电机 直流防爆电机 防爆电机 汽车助力转向电机 EPS电机 faulhaber motor faulhaber gearbox NANOTEC电机 ELWOOD电机 PHYTRON电机 EXLAR伺服电动缸 高力矩、高性能直流电机,音圈电机,风机,直流风机,航空风机 | 江西富兴节能建材有限公司| 全棉帆布厂家_加工帆布_涤棉帆布价格_染色帆布定制_广州美丽华皮革帆布-广州美丽华皮革帆布 | 叶片泵,液压电机,油泵电机,变量叶片泵,油压电机-广东俊泰液压科技有限公司 | 钻机配件-岩心管-岩心管接箍-地质套管-煤矿用钻头-河南滨远机械设备有限公司 | 液化气密度测定仪,原油有机氯测定仪-泰州市姜堰分析仪器厂 | 上海先顶仪器设备有限公司-国产氮气发生器-进口氮气发生器 | 苏州拆除公司_太仓拆除公司_常熟拆除公司_昆山拆除公司--苏州伊诺尔拆除工程有限公司 | 旋转补偿器-专注套筒三维球形补偿器定制生产厂家-伸缩接头价格_巩义市新华丰管道设备有限公司 | 造型松|泰山迎客松|造型油松-泰安小苹果园林 | 湖南长沙癫痫病医院_湖南癫痫病专科医院_湖南治疗癫痫病专业医院_长沙和谐医院有限公司 | 信管飞软件官网 - 亚拓软件旗下精细化管理软件、进销存管理软件、混凝土ERP、通风设备ERP、风管报价软件、出纳软件、送货单打印软件、ERP软件等免费下载 | 尾矿干排_机制砂尾矿干排_带式压滤机|山东森鹏环保科技有限公司 潍坊卓瑞机械有限公司,输送设备,石灰消化设备,餐厨垃圾设备,化机浆设备,污泥脱水 | 水处理设备_纯净水设备_软化水设备_反渗透水处理设备「陕西甘肃青海宁夏新疆」认准海川环保 | 转轮除湿机_工业除湿机_恒温恒湿机-铂克除湿机厂家 | 思行科技-珠海小程序开发-珠海网站建设-珠海APP开发-江门小程序开发-江门网站建设-江门APP开发 | 三机一体除湿干燥机,色母机,称重式拌料机,工业冻水机,中央集中供料-东莞市瑞达机械科技有限公司(瑞达国际) | 合肥食品检测-安徽卫生检测-水质检测机构-安徽金标准检测研究院有限公司 | 兰州物流公司_兰州货运公司_兰州物流电话上门取货_兰州立辉物流公司 | 河南新百福国际物流有限公司| 深圳喜运达物流官网_东南亚物流|海运|专线|海外仓_泰国菲律宾马来西亚海运|物流专线|海外仓 | 自动烘干线,工业烘箱生产厂家-湖南耐美特智能装备有限公司官方网站 | 金华银焊条-金华银焊丝-银焊片制造商-银焊环批发商-浙江焊丝生产商-焊环厂家-浙江永旺焊材制造有限公司 | 举升机,登高梯,升降平台,升降车,升降机,高空作业平台车 | 新密耐火材料厂家价格-河南郑州荣盛窑炉耐火材料有限公司 | 新高度,萍乡市场调查研究公司,萍乡市场调研公司,萍乡第三方评估机构,萍乡神秘顾客暗访公司 | 噪声治理,消声器,隔声屏障,隔声罩,噪声控制,降噪,空调降噪,水泵噪声治理,冷却塔噪声治理-北京华清恒业环保设备有限公司 | 新鲜水果 新鲜茶 - 甜啦啦官网 | 微波烘干设备厂家-微波烘干干燥设备-山东邦普机械设备有限公司 | 河北徐工鲲鹏工程机械有限公司无锡分公司 | 银龙制冷—北京冷库工程建设安装公司!【20年专业制冷】 | 网架厂_网架加工厂家_徐州网架公司报价--三华网架制造商 | 精品中文字幕在线观看,粉嫩av一区二区三区,最近中文字幕在线看免费视频,亚洲高清在线观看,日本一区二区视频手机免费看,国产黄色小视频,亚洲高清免费视频,国产精品一区二区欧美视频,亚洲人免费视频,亚洲视频在线观看免费,国产免费高清综合视频,中文字幕永久在线 |