وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
1

Cybersecurity for IoT (Internet of Things)

سرفصل های دوره

Master IoT security: Protect devices, networks, and data from cyber threats


1 - Introduction
  • 1 -Lecture 01.pptx
  • 1 -Understanding the Internet of Things (IoT) Landscape
  • 2 -IoT Devices, Sensors, and Communication Protocols
  • 2 -Lecture 02.pptx
  • 3 -Lecture 03.pptx
  • 3 -The Crucial Role of Cybersecurity in IoT
  • 4 -Common IoT Security Threats and Vulnerabilities
  • 4 -Lecture 04.pptx
  • 5 -Lecture 05.pptx
  • 5 -Real-World Examples of IoT Security Breaches

  • 2 - Securing IoT Devices
  • 1 -Fundamentals of IoT Device Security
  • 1 -Lecture 06.pptx
  • 2 -Hardware Security Features for IoT Devices
  • 2 -Lecture 07.pptx
  • 3 -Firmware Updates and Patch Management Strategies
  • 3 -Lecture 08.pptx
  • 4 -Implementing Strong Device Authentication and Access Control
  • 4 -Lecture 09.pptx
  • 5 -Best Practices for Secure Device Provisioning and Decommissioning
  • 5 -Lecture 10.pptx

  • 3 - IoT Network and Communication Security
  • 1 -Lecture 11.pptx
  • 1 -Securing Wireless Networks in IoT Environments
  • 2 -Encrypting and Protecting Data in Transit
  • 2 -Lecture 12.pptx
  • 3 -Lecture 13.pptx
  • 3 -Securing IoT Gateways and Edge Devices
  • 4 -Lecture 14.pptx
  • 4 -Mitigating Common Network Attacks (DDoS, MITM)
  • 5 -Hands-On Lab Configuring Secure IoT Network Communication
  • 5 -Lecture 15.pptx

  • 4 - Cloud and Backend Security for IoT
  • 1 -Lecture 16.pptx
  • 1 -Securing Cloud Platforms and Services for IoT
  • 2 -Data Protection and Encryption at Rest
  • 2 -Lecture 17.pptx
  • 3 -Designing Secure APIs and Interfaces
  • 3 -Lecture 18.pptx
  • 4 -Implementing User Authentication and Access Management
  • 4 -Lecture 19.pptx
  • 5 -Lecture 20.pptx
  • 5 -Monitoring and Logging for IoT Security Incidents

  • 5 - IoT Security Testing and Auditing
  • 1 -Lecture 21.pptx
  • 1 -Vulnerability Assessment and Penetration Testing for IoT
  • 2 -Conducting Security Audits and Ensuring Compliance
  • 2 -Lecture 22.pptx
  • 3 -Developing an Effective IoT Security Testing Methodology
  • 3 -Lecture 23.pptx
  • 4 -Essential Tools for IoT Security Testing (Kali Linux, Wireshark, Nmap)
  • 4 -Lecture 24.pptx
  • 5 -Hands-On Lab Performing IoT Security Testing
  • 5 -Lecture 25.pptx

  • 6 - IoT Security Best Practices and Standards
  • 1 -Implementing OWASP IoT Top 10 Best Practices
  • 1 -Lecture 26.pptx
  • 2 -Adhering to Relevant IoT Security Standards and Frameworks (NIST SP 800-213)
  • 2 -Lecture 27.pptx
  • 3 -Integrating Security into the IoT Development Lifecycle
  • 3 -Lecture 28.pptx
  • 4 -Applying Security by Design Principles in IoT
  • 4 -Lecture 29.pptx
  • 5 -Case Studies Learning from Real-World IoT Security Implementations
  • 5 -Lecture 30.pptx

  • 7 - IoT Security Incident Response and Forensics
  • 1 -Lecture 31.pptx
  • 1 -Preparing an Incident Response Plan for IoT Security Breaches
  • 2 -Conducting IoT Forensics and Incident Investigations
  • 2 -Lecture 32.pptx
  • 3 -Implementing Containment and Recovery Strategies
  • 3 -Lecture 33.pptx
  • 4 -Lecture 34.pptx
  • 4 -Lessons Learned and Continuous Improvement in IoT Security
  • 5 -Hands-On Lab Simulating and Responding to IoT Security Incidents
  • 5 -Lecture 35.pptx
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 44329
    حجم: 1310 مگابایت
    مدت زمان: 179 دقیقه
    تاریخ انتشار: ۲۰ اردیبهشت ۱۴۰۴
    دیگر آموزش های این مدرس
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید