وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

IoT Product Security

سرفصل های دوره

As with the traditional internet, the Internet of Things (IoT) is increasingly targeted by malicious attacks. Whether you are a CISO or security director for an organization that produces IoT or IIoT products, a product engineer looking to understand IoT engineering principles, or you just have a desire to learn how IoT devices should be secured, you should explore this advanced IoT product security course to learn how to build a risk-based IoT product security program in this quickly-evolving field.

This course was created by Cybrary. We are pleased to host this training in our library.


01 - Introduction
  • 01 - Course and instructor introduction
  • 02 - IoT then and now
  • 03 - IoT product lifecycle Part 1
  • 04 - IoT product lifecycle Part 2
  • 05 - OWASP Top 10 Part 1
  • 06 - OWASP Top 10 Part 2

  • 02 - 1. Product Security Programs
  • 01 - Foundations for success
  • 02 - IoT product security program Part 1
  • 03 - IoT product security program Part 2
  • 04 - CPSO reporting structure Part 1
  • 05 - CPSO reporting structure Part 2
  • 06 - CPSO reporting structure Part 3
  • 07 - Supplier risk
  • 08 - Contracts
  • 09 - Case study CCleaner

  • 03 - 2. Security by Design
  • 01 - First steps Framework
  • 02 - Architecture stages Part 1
  • 03 - Architecture stages Part 2
  • 04 - IoT ecosystems
  • 05 - IoT communications Part 1
  • 06 - IoT communications Part 2

  • 04 - 3. Hardware Root of Trust
  • 01 - Foundations of trust Part 1
  • 02 - Foundations of trust Part 2
  • 03 - Foundations of trust Part 3
  • 04 - Foundations of trust Part 4
  • 05 - Encryption
  • 06 - Trusted execution environment
  • 07 - Trusted Platform Module Part 1
  • 08 - Trusted Platform Module Part 2
  • 09 - Trusted Platform Module Part 3
  • 10 - Trusted Platform Module Part 4
  • 11 - Hardware security
  • 12 - DICE Part 1
  • 13 - DICE Part 2
  • 14 - Module 14 review

  • 05 - 4. Secure Development
  • 01 - Product design (hardware) Part 1
  • 02 - Product design (hardware) Part 2
  • 03 - Product design (hardware) Part 3
  • 04 - Product design (software)
  • 05 - IoT operating systems
  • 06 - IoT Bill of Materials Part 1
  • 07 - IoT Bill of Materials Part 2

  • 06 - 5. Build, Ship, Operate
  • 01 - Manufacturing and provisioning
  • 02 - Vulnerability management and patching Part 1
  • 03 - Vulnerability management and patching Part 2
  • 04 - Vulnerability Disclosure Program Part 1
  • 05 - Vulnerability Disclosure Program Part 2
  • 06 - Vulnerability Disclosure Program Part 3
  • 07 - Device ownership
  • 08 - IOTSF Secure Design Best Practice Guides

  • 07 - 6. Privacy
  • 01 - Data privacy Part 1
  • 02 - Data privacy Part 2
  • 03 - Reasonable security A review of US law affecting IoT
  • 04 - Global IoT laws A review of international law affecting IoT
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 27912
    حجم: 865 مگابایت
    مدت زمان: 490 دقیقه
    تاریخ انتشار: 17 دی 1402
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید