EC-Council IoT Security Essentials (ISE)

Price
$1,095.00 USD

Duration
2 Days

 

Delivery Methods
Virtual Instructor Led
Private Group

Course Overview

EC-Council’s IoT Security Essentials Series provides comprehensive coverage of essential topics in securing Internet of Things (IoT) systems. From understanding the fundamental concepts of IoT to addressing advanced security threats, students will gain the knowledge and skills necessary to design, deploy, and maintain secure IoT solutions. Through a combination of theoretical learning and hands-on exercises, participants will explore IoT fundamentals, networking and communication protocols, cloud integration, threat intelligence, incident response, and security engineering principles. Put your newly acquired abilities to the test with an exhilarating Capture the Flag (CTF) Exercise seamlessly integrated in our Capstone project. This CTF is seamlessly integrated by live virtual machines, genuine software, and real networks, all delivered within a secure and regulated sandbox environment. With these exclusive hands-on, human-versus-machine CTF challenges you will develop the hands-on proficiencies essential for success in your cyber professional role.

Ultimately, students will be equipped with the expertise needed to effectively identify, assess, and mitigate security risks in IoT environments, ensuring the integrity, confidentiality, and availability of IoT systems and data.

Course Objectives

  • Gain insights into the emergence of the Internet of Things (IoT).
  • Learn about the devices that make your home a smart home.
  • Dive deep into IoT communication models.
  • Gain a deep understanding of IoT networking and communication.
  • Understand cloud computing in depth.
  • Learn about the different types of threats to IoT

Who Should Attend?

  • School students, graduates, professionals, career starters and changers, IT / Technology / Cybersecurity teams with little or no work experience.
  • Individuals who want to start a career in cybersecurity and are interested in IoT Security.
  • Anyone interested in gaining in-depth knowledge on safeguarding their smart devices or those within their organization.
  • Top-rated instructors: Our crew of subject matter experts have an average instructor rating of 4.8 out of 5 across thousands of reviews.
  • Authorized content: We maintain more than 35 Authorized Training Partnerships with the top players in tech, ensuring your course materials contain the most relevant and up-to date information.
  • Interactive classroom participation: Our virtual training includes live lectures, demonstrations and virtual labs that allow you to participate in discussions with your instructor and fellow classmates to get real-time feedback.
  • Post Class Resources: Review your class content, catch up on any material you may have missed or perfect your new skills with access to resources after your course is complete.
  • Private Group Training: Let our world-class instructors deliver exclusive training courses just for your employees. Our private group training is designed to promote your team’s shared growth and skill development.
  • Tailored Training Solutions: Our subject matter experts can customize the class to specifically address the unique goals of your team.

Learning Credits: Learning Credits can be purchased well in advance of your training date to avoid having to commit to specific courses or dates. Learning Credits allow you to secure your training budget for an entire year while eliminating the administrative headache of paying for individual classes. They can also be redeemed for a full year from the date of purchase. If you have previously purchased a Learning Credit agreement with New Horizons, you may use a portion of your agreement to pay for this class.

If you have questions about Learning Credits, please contact your Account Manager.

Corporate Tech Pass: Our Corporate Tech Pass includes unlimited attendance for a single person, in the following Virtual Instructor Led course types: Microsoft Office, Microsoft Technical, CompTIA, Project Management, SharePoint, ITIL, Certified Ethical Hacker, Certified Hacking Forensics Investigator, Java, Professional Development Courses and more. The full list of eligible course titles can be found at https://www.newhorizons.com/eligible.

If you have questions about our Corporate Tech Pass, please contact your Account Manager.

Course Prerequisites

There are no prerequisites for this course.

Agenda

Module 1: IoT Fundamentals

  • This module will introduce you to the basics of IoT and the different sectors where IoT is established.

Module 2: IoT Networking and Communication

  • This module will provide insights into the basics of networking concepts, the OSI Model, and the TCP Model. It will also cover the IEEE IoT Standards List.

Module 3: IoT Processors and Operating Systems

  • This module will help you understand the hardware devices, processors, and operating systems used in IoT.

Module 4: Cloud and IoT

  • This module will teach you about cloud computing, its characteristics, and the types of cloud services.

Module 5: IoT Advanced Topics

  • This module will brief you about web communications, mobile applications, and native applications.

Module 6: IoT Threats

  • This module will introduce you to some of the common IoT attacks, such as Mirai, BrikerBot, Sybii, and Blackhole attacks.

Module 7: Basic Security

  • This module will discuss the CIA triangle, Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), and IoT security measures.

Module 8: Cloud Security

  • This module will discuss the state of cloud security, cloud vulnerabilities, NSA guidance, and secure cloud computing.

Module 9: Threat Intelligence

  • This module will start with the topic of the National Vulnerability Database, covering US Cert, Shodan, STRIDE, DREAD, PASTA, and CVSS.

Module 10: IoT Incident Response

  • This module will provide information on incident response in IoT, including standards, processes, procedures, tools, and indicators of compromise.

Module 11: IoT Security Engineering

  • This module will cover the 12 practices of the Microsoft Secure Development Lifecycle and Threat Modeling
 

Get in touch to schedule training for your team
We can enroll multiple students in an upcoming class or schedule a dedicated private training event designed to meet your organization’s needs.

 



Do You Have Additional Questions? Please Contact Us Below.

contact us contact us 
 
Contact Us about Starting Your Business Training Strategy with New Horizons