Certified Internet of Things Security Practitioner (CIoTSP) v1.0

Pre-Requisites: To ensure your success in this course, you should have a fundamental understanding of IoT ecosystems. And candidates should complete Certified Internet of Things Practitioner (CIoTP) training offered at GIT.

5-stars

Key Features

  • Online live classroom available
  • Quality learning materials
  • Small Class Sizes
  • State of the Art Facility
  • Free Retakes
  • Instructor Led Classroom training
  • Certified Industry Experienced Teachers
  • 100% Job Placement assistance

Certified Internet of Things Security Practitioner – This course is designed for practitioners who are seeking to demonstrate a vendor-neutral, cross-industry skill set that will enable them to design, implement, operate, and/or manage a secure IoT ecosystem.

This course is designed for IoT practitioners who are looking to improve their skills and knowledge of IoT security and privacy.

CERTIFIED INTERNET OF THINGS SECURITY PRACTITIONER (CIOTSP) IS THE CERTIFICATION TO VALIDATE A COMPREHENSIVE UNDERSTANDING OF IOT SECURITY.

According to the AT&T State of IoT Survey, 90% of businesses lack the full confidence that their IoT devices are secure. IoT creates exponential vulnerabilities which IT security teams are not currently prepared to defend. CertNexus’ Certified IoT Security Practitioner (CIoTSP) certification program validate that the candidate has the knowledge, skills, and abilities to secure network environments for IoT devices, analyze vulnerabilities and determine reasonable controls against threats, and effectively monitor IoT devices and respond to incidents. Students will be prepared for the exam # ITS-110.

1 – MANAGING IOT RISKS

  • Map the IoT Attack Surface
  • Build in Security by Design

2 – SECURING WEB AND CLOUD INTERFACES

  • Identify Threats to IoT Web and Cloud Interfaces
  • Prevent Injection Flaws
  • Prevent Session Management Flaws
  • Prevent Cross-Site Scripting Flaws
  • Prevent Cross-Site Request Forgery Flaws
  • Prevent Unvalidated Redirects and Forwards

3 – SECURING DATA

  • Use Cryptography Appropriately
  • Protect Data in Motion
  • Protect Data at Rest
  • Protect Data in Use

4 – CONTROLLING ACCESS TO IOT RESOURCES

  • Identify the Need to Protect IoT
  • Implement Secure Authentication
  • Implement Secure Authorization
  • Implement Security Monitoring on IoT Systems

5 – SECURING IOT NETWORKS

  • Ensure the Security of IP Networks
  • Ensure the Security of Wireless Networks
  • Ensure the Security of Mobile Networks
  • Ensure the Security of IoT Edge Networks

6 – ENSURING PRIVACY

  • Improve Data Collection to Reduce Privacy Concerns
  • Protect Sensitive Data
  • Dispose of Sensitive Data

7 – MANAGING SOFTWARE AND FIRMWARE RISKS

  • Manage General Software Risks
  • Manage Risks Related to Software Installation and Configuration
  • Manage Risks Related to Software Patches and Updates
  • Manage Risks Related to IoT Device Operating Systems and Firmware

8 – PROMOTING PHYSICAL SECURITY

  • Protect Local Memory and Storage
  • Prevent Physical Port Access

Course Number : IOPT-0-0102

Duration : 48 hours

[]
1 Step 1

Request Information!

Who you are?
First Nameyour first name
Last Nameyour last name
Address
City
ZipZip
Phone Number
Commentsmore details
0 /

By submitting this form, you are giving your express written consent for Global Information Technology to contact you regarding our programs and services using email, telephone or text.  This consent is not required to purchase goods/services, and you may always call us directly at 1-866-464-4846.

Previous
Next