Certified Internet of Things Security Practitioner (CIoTSP)

(EMICH-ITS-110.AK1)
Lessons
Lab
TestPrep
Get A Free Trial

Skills You’ll Get

1

Introduction

  • Course Description
  • How to Use This Course
2

Planning an IoT Implementation

  • Topic A: Select a General Architecture for an IoT Project
  • Topic B: Identify the Benefits and Challenges of IoT
  • Summary
3

Constructing and Programming an IoT Device

  • Topic A: Select and Configure a Processing Unit
  • Topic B: Select a Microcontroller Power Source
  • Topic C: Use a Software Development Kit to Program an IoT Device
  • Summary
4

Communicating with an IoT Device

  • Topic A: Communicate Using Wired Connections
  • Topic B: Communicate Using Wireless Connections
  • Topic C: Communicate Using Internet Protocols
  • Summary
5

Processing IoT Data

  • Topic A: Process IoT Device Input and Output
  • Topic B: Process Data in the Cloud
  • Topic C: Provide M2M Communication
  • Summary
6

Managing Risks on IoT Projects

  • Topic A: Identify IoT Security and Privacy Risks
  • Topic B: Manage IoT Security and Privacy Risks
  • Topic C: Manage IoT Safety Risks
  • Summary
7

Undertaking an IoT Project

  • Topic A: Identify Real World Applications for IoT
  • Topic B: Follow the IoT Development Lifecycle
  • Summary
8

Managing IoT Risks

  • Topic A: Map the IoT Attack Surface
  • Topic B: Build in Security by Design
  • Summary
9

Securing Web and Cloud Interfaces

  • Topic A: Identify Threats to IoT Web and Cloud Interfaces
  • Topic B: Prevent Injection Flaws
  • Topic C: Prevent Session Management Flaws
  • Topic D: Prevent Cross-Site Scripting Flaws
  • Topic E: Prevent Cross-Site Request Forgery Flaws
  • Topic F: Prevent Unvalidated Redirects and Forwards
  • Summary
10

Securing Data

  • Topic A: Use Cryptography Appropriately
  • Topic B: Protect Data in Motion
  • Topic C: Protect Data at Rest
  • Topic D: Protect Data in Use
  • Summary
11

Controlling Access to IoT Resources

  • Topic A: Identify the Need to Protect IoT Resources
  • Topic B: Implement Secure Authentication
  • Topic C: Implement Secure Authorization
  • Topic D: Implement Security Monitoring on IoT Systems
  • Summary
12

Securing IoT Networks

  • Topic A: Ensure the Security of IP Networks
  • Topic B: Ensure the Security of Wireless Networks
  • Topic C: Ensure the Security of Mobile Networks
  • Topic D: Ensure the Security of IoT Edge Networks
  • Summary
13

Ensuring Privacy

  • Topic A: Improve Data Collection to Reduce Privacy Concerns
  • Topic B: Protect Sensitive Data
  • Topic C: Dispose of Sensitive Data
  • Summary
14

Managing Software and Firmware Risks

  • Topic A: Manage General Software Risks
  • Topic B: Manage Risks Related to Software Installation and Configuration
  • Topic C: Manage Risks Related to Software Patches and Updates
  • Topic D: Manage Risks Related to IoT Device Operating Systems and Firmware
  • Summary
15

Promoting Physical Security

  • Topic A: Protect Local Memory and Storage
  • Topic B: Prevent Physical Port Access
  • Summary
16

Mapping CertNexus Certified Internet of Things Practitioner (CIoTP)

A

Appendix A: Mapping CertNexus Certified Internet...tioner Exam ITS-110 Objectives to Course Content

1

Constructing and Programming an IoT Device

  • Attaching a Microcontroller Development Board to the CPU Using USB Cables
2

Communicating with an IoT Device

  • Getting TCP Settings
  • Getting UDP Settings
3

Processing IoT Data

  • Installing Components on the Breadboard
4

Managing Risks on IoT Projects

  • Conducting a DoS Attack Using a SYN Flood
  • Identifying Virus Threats
  • Exploiting a Website Using SQL Injection
  • Defending against IP Spoofing
  • Searching Vulnerability Using Metasploit
  • Performing a DDoS Attack Using cmd
  • Performing ARP Spoofing
  • Exploiting LDAP-based Authentication
  • Attacking a Website Using XSS Injection
5

Securing Web and Cloud Interfaces

  • Creating a New Inbound Rule
  • Exploiting LDAP-Based Authentication
  • Exploiting a Website Using SQL Injection
  • Using OWASP ZAP
6

Securing Data

  • Applying Symmetric Key Encryption
  • Using the MD5 Hash Algorithm
  • Using OpenSSL to Create a Public/Private Key Pair
  • Performing a MITM Attack
  • Performing a Memory-Based Attack
7

Securing IoT Networks

  • Performing ARP Spoofing
  • Spoofing MAC Address
  • Obtaining Information about Different IP Versions
  • Obtaining Hardware Information of a Network Adapter
  • Obtaining the ARP Cache
  • Obtaining the IP Version of a Network Adapter
  • Obtaining the IP Route Information from the IP Routing Table
  • Obtaining Information about the Net Firewall Profile
  • Getting the TCP Settings
  • Getting Information about the Current Connection Statistics of TCP
  • Getting Information about the TCP Ports
  • Getting the UDP Settings
  • Getting Information about the Current Connection Statistics of UDP
  • Getting Information about the UDP Ports
  • Scanning the Local Network

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

We can Certified Internet of Things Security Practitioner (CIoTSP)

$279.99

Buy Now

Related Courses

All Courses
scroll to top