Certified Internet of Things Security Practitioner (CIoTSP)

(EMICH-ITS-110.AK1)
Lessons
Lab
TestPrep
Get A Free Trial

Skills You’ll Get

1

Introduction

  • Course Description
  • How to Use This Course
2

Planning an IoT Implementation

  • Topic A: Select a General Architecture for an IoT Project
  • Topic B: Identify the Benefits and Challenges of IoT
  • Summary
3

Constructing and Programming an IoT Device

  • Topic A: Select and Configure a Processing Unit
  • Topic B: Select a Microcontroller Power Source
  • Topic C: Use a Software Development Kit to Program an IoT Device
  • Summary
4

Communicating with an IoT Device

  • Topic A: Communicate Using Wired Connections
  • Topic B: Communicate Using Wireless Connections
  • Topic C: Communicate Using Internet Protocols
  • Summary
5

Processing IoT Data

  • Topic A: Process IoT Device Input and Output
  • Topic B: Process Data in the Cloud
  • Topic C: Provide M2M Communication
  • Summary
6

Managing Risks on IoT Projects

  • Topic A: Identify IoT Security and Privacy Risks
  • Topic B: Manage IoT Security and Privacy Risks
  • Topic C: Manage IoT Safety Risks
  • Summary
7

Undertaking an IoT Project

  • Topic A: Identify Real World Applications for IoT
  • Topic B: Follow the IoT Development Lifecycle
  • Summary
8

Managing IoT Risks

  • Topic A: Map the IoT Attack Surface
  • Topic B: Build in Security by Design
  • Summary
9

Securing Web and Cloud Interfaces

  • Topic A: Identify Threats to IoT Web and Cloud Interfaces
  • Topic B: Prevent Injection Flaws
  • Topic C: Prevent Session Management Flaws
  • Topic D: Prevent Cross-Site Scripting Flaws
  • Topic E: Prevent Cross-Site Request Forgery Flaws
  • Topic F: Prevent Unvalidated Redirects and Forwards
  • Summary
10

Securing Data

  • Topic A: Use Cryptography Appropriately
  • Topic B: Protect Data in Motion
  • Topic C: Protect Data at Rest
  • Topic D: Protect Data in Use
  • Summary
11

Controlling Access to IoT Resources

  • Topic A: Identify the Need to Protect IoT Resources
  • Topic B: Implement Secure Authentication
  • Topic C: Implement Secure Authorization
  • Topic D: Implement Security Monitoring on IoT Systems
  • Summary
12

Securing IoT Networks

  • Topic A: Ensure the Security of IP Networks
  • Topic B: Ensure the Security of Wireless Networks
  • Topic C: Ensure the Security of Mobile Networks
  • Topic D: Ensure the Security of IoT Edge Networks
  • Summary
13

Ensuring Privacy

  • Topic A: Improve Data Collection to Reduce Privacy Concerns
  • Topic B: Protect Sensitive Data
  • Topic C: Dispose of Sensitive Data
  • Summary
14

Managing Software and Firmware Risks

  • Topic A: Manage General Software Risks
  • Topic B: Manage Risks Related to Software Installation and Configuration
  • Topic C: Manage Risks Related to Software Patches and Updates
  • Topic D: Manage Risks Related to IoT Device Operating Systems and Firmware
  • Summary
15

Promoting Physical Security

  • Topic A: Protect Local Memory and Storage
  • Topic B: Prevent Physical Port Access
  • Summary
16

Mapping CertNexus Certified Internet of Things Practitioner (CIoTP)

A

Appendix A: Mapping CertNexus Certified Internet...tioner Exam ITS-110 Objectives to Course Content

1

Constructing and Programming an IoT Device

  • Attaching a Microcontroller Development Board to the CPU Using USB Cables
2

Communicating with an IoT Device

  • Getting TCP Settings
  • Getting UDP Settings
3

Processing IoT Data

  • Installing Components on the Breadboard
4

Managing Risks on IoT Projects

  • Conducting a DoS Attack Using a SYN Flood
  • Identifying Virus Threats
  • Exploiting a Website Using SQL Injection
  • Defending against IP Spoofing
  • Searching Vulnerability Using Metasploit
  • Performing a DDoS Attack Using cmd
  • Performing ARP Spoofing
  • Exploiting LDAP-based Authentication
  • Attacking a Website Using XSS Injection
5

Securing Web and Cloud Interfaces

  • Creating a New Inbound Rule
  • Exploiting LDAP-Based Authentication
  • Exploiting a Website Using SQL Injection
  • Using OWASP ZAP
6

Securing Data

  • Applying Symmetric Key Encryption
  • Using the MD5 Hash Algorithm
  • Using OpenSSL to Create a Public/Private Key Pair
  • Performing a MITM Attack
  • Performing a Memory-Based Attack
7

Securing IoT Networks

  • Performing ARP Spoofing
  • Spoofing MAC Address
  • Obtaining Information about Different IP Versions
  • Obtaining Hardware Information of a Network Adapter
  • Obtaining the ARP Cache
  • Obtaining the IP Version of a Network Adapter
  • Obtaining the IP Route Information from the IP Routing Table
  • Obtaining Information about the Net Firewall Profile
  • Getting the TCP Settings
  • Getting Information about the Current Connection Statistics of TCP
  • Getting Information about the TCP Ports
  • Getting the UDP Settings
  • Getting Information about the Current Connection Statistics of UDP
  • Getting Information about the UDP Ports
  • Scanning the Local Network

Related Courses

All Courses
scroll to top