وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
1

IoT Product Security

سرفصل های دوره

As with the traditional internet, the Internet of Things (IoT) is increasingly targeted by malicious attacks. Whether you are a CISO or security director for an organization that produces IoT or IIoT products, a product engineer looking to understand IoT engineering principles, or you just have a desire to learn how IoT devices should be secured, you should explore this advanced IoT product security course to learn how to build a risk-based IoT product security program in this quickly-evolving field.

This course was created by Cybrary. We are pleased to host this training in our library.


01 - Introduction
  • 01 - Course and instructor introduction
  • 02 - IoT then and now
  • 03 - IoT product lifecycle Part 1
  • 04 - IoT product lifecycle Part 2
  • 05 - OWASP Top 10 Part 1
  • 06 - OWASP Top 10 Part 2

  • 02 - 1. Product Security Programs
  • 01 - Foundations for success
  • 02 - IoT product security program Part 1
  • 03 - IoT product security program Part 2
  • 04 - CPSO reporting structure Part 1
  • 05 - CPSO reporting structure Part 2
  • 06 - CPSO reporting structure Part 3
  • 07 - Supplier risk
  • 08 - Contracts
  • 09 - Case study CCleaner

  • 03 - 2. Security by Design
  • 01 - First steps Framework
  • 02 - Architecture stages Part 1
  • 03 - Architecture stages Part 2
  • 04 - IoT ecosystems
  • 05 - IoT communications Part 1
  • 06 - IoT communications Part 2

  • 04 - 3. Hardware Root of Trust
  • 01 - Foundations of trust Part 1
  • 02 - Foundations of trust Part 2
  • 03 - Foundations of trust Part 3
  • 04 - Foundations of trust Part 4
  • 05 - Encryption
  • 06 - Trusted execution environment
  • 07 - Trusted Platform Module Part 1
  • 08 - Trusted Platform Module Part 2
  • 09 - Trusted Platform Module Part 3
  • 10 - Trusted Platform Module Part 4
  • 11 - Hardware security
  • 12 - DICE Part 1
  • 13 - DICE Part 2
  • 14 - Module 14 review

  • 05 - 4. Secure Development
  • 01 - Product design (hardware) Part 1
  • 02 - Product design (hardware) Part 2
  • 03 - Product design (hardware) Part 3
  • 04 - Product design (software)
  • 05 - IoT operating systems
  • 06 - IoT Bill of Materials Part 1
  • 07 - IoT Bill of Materials Part 2

  • 06 - 5. Build, Ship, Operate
  • 01 - Manufacturing and provisioning
  • 02 - Vulnerability management and patching Part 1
  • 03 - Vulnerability management and patching Part 2
  • 04 - Vulnerability Disclosure Program Part 1
  • 05 - Vulnerability Disclosure Program Part 2
  • 06 - Vulnerability Disclosure Program Part 3
  • 07 - Device ownership
  • 08 - IOTSF Secure Design Best Practice Guides

  • 07 - 6. Privacy
  • 01 - Data privacy Part 1
  • 02 - Data privacy Part 2
  • 03 - Reasonable security A review of US law affecting IoT
  • 04 - Global IoT laws A review of international law affecting IoT
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 27912
    حجم: 865 مگابایت
    مدت زمان: 490 دقیقه
    تاریخ انتشار: ۱۷ دی ۱۴۰۲
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید