Course Description
The course will cover the fundamentals of IoT risk and regulation, fundamental of IoT solutions through a case study; the components and technologies to provide a baseline understanding of the systems and devices that you need to protect. In addition to IoT threats & attacks, IoT risk management, compliance that need to be followed with the laws and regulations.
What am I going to get from this course?
- Understanding IoT Fundamentals.
- IoT Architecture.
- Understanding IoT Threats.
- Understanding IoT Solution Risk Management.
- Understanding IoT Compliance.
Prerequisites and Target Audience
What will students need to know or do before starting this course?
Basic Computer Knowledge.
Who should take this course? Who should not?
Anyone who is interested in IoT security solution, threats, risks, compliance, and regulations.
Curriculum
Module 1: Introduction
09:31
Lecture 1
What IoT?
04:02
A brief description of IoT technology.
In this lecture, we will cover the importance of IoT in business and personal life and why big business is investing in IoT.
IoT History and how its started,
Lecture 4
IoT Implementation
The different IoT Implementation components and phases
Different IoT layers definitions and functionality.
A high-level explanation about the Hardware used for IoT, especially different types of Microcontroller and the advantage / disadvantage of each one of them.
Different IoT Sofware category and the usage of each one of them.
Module 2: Case Study
28:43
Introduction to the case studies that will be covered in this module.
Lecture 9
Self-Driving Vehicle
06:47
A Case Study of Self- Driving Vehicle as a proof of concept
Major threats actor facing Smar Driving Vehicles (SDV)
Lecture 11
Security Credential Management System (SCMS)
06:36
The SCMS is a POC message security solution for vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication.
Lecture 12
Energy Management for Smart City
05:43
Second IoT case study which is Energy Management for Smart City
The definition of IoT Security
Lecture 14
Security In Layers
Using different layers in an security implementation is considered a best practice.
A definition of the IoT privacy
IoT Attacks vector and the best sources to identify the latest IoT surface attack and vulnerability
Lecture 17
Weak passwords
One of OWASP IoT vulnerability is weak and default passwords.
Lecture 18
Denial of Service attack
An explanation with a demonstration for Denial of service attack (DOS Attack)
Lecture 19
Unencrypted Services
Encryption is considered on of OWASP top IoT Vulnerability
Module 4: Risk Management
Lecture 20
Introduction to Risk Management
A brief Introduction to Risk Managment Section
Lecture 21
Risk Definitions
Important Risk Definitions that you need to be aware of before doing a Risk assessment.
Lecture 22
Risk Management Strategies
The 4 different strategies that is used to manage different types of Risk.
A Risk Analysis Description
Lecture 24
Risk Calculation
Lecture 25
Risk Management Framework - NIST
The Standard that needs to be followed when conducting a Risk assessment from National Institute of standards and technology (NIST) .
NIST SP 800-30
Lecture 26
IoT Risk assessment guidelines
Another IoT Risk assessment guidelines
Lecture 27
IoT Security and Privacy Risk Consideration -NIST
NIST Approach for IoT Security and Privacy Risk Consideration for any business solution
Module 5: ModuIoT Regulation and Compliance le...
Lecture 28
IoT Security Regulation
The Maor IoT Security Regulation in US and Europe
Lecture 29
IoT Privacy Regulation
The Major 29- IoT Privacy Regulation (European Union Article 29 Data Protection )
Lecture 30
Compliance Schemes
Other Information Security Compliance such as HIPAA, PCI /DSS