Certified Internet of Things Security Practitioner (CIoTSP)

(ITS-110.AK1) / ISBN : 978-1-64459-207-6
This course includes
Interactive Lessons
Gamified TestPrep
Hands-On Labs
AI Tutor (Add-on)
158 Reviews
Get A Free Trial

About This Course

Skills You’ll Get

1

Introduction

  • Course Description
  • How to Use This Course
2

Managing IoT Risks

  • Topic A: Map the IoT Attack Surface
  • Topic B: Build in Security by Design
  • Summary
3

Securing Web and Cloud Interfaces

  • Topic A: Identify Threats to IoT Web and Cloud Interfaces
  • Topic B: Prevent Injection Flaws
  • Topic C: Prevent Session Management Flaws
  • Topic D: Prevent Cross-Site Scripting Flaws
  • Topic E: Prevent Cross-Site Request Forgery Flaws
  • Topic F: Prevent Unvalidated Redirects and Forwards
  • Summary
4

Securing Data

  • Topic A: Use Cryptography Appropriately
  • Topic B: Protect Data in Motion
  • Topic C: Protect Data at Rest
  • Topic D: Protect Data in Use
  • Summary
5

Controlling Access to IoT Resources

  • Topic A: Identify the Need to Protect IoT Resources
  • Topic B: Implement Secure Authentication
  • Topic C: Implement Secure Authorization
  • Topic D: Implement Security Monitoring on IoT Systems
  • Summary
6

Securing IoT Networks

  • Topic A: Ensure the Security of IP Networks
  • Topic B: Ensure the Security of Wireless Networks
  • Topic C: Ensure the Security of Mobile Networks
  • Topic D: Ensure the Security of IoT Edge Networks
  • Summary
7

Ensuring Privacy

  • Topic A: Improve Data Collection to Reduce Privacy Concerns
  • Topic B: Protect Sensitive Data
  • Topic C: Dispose of Sensitive Data
  • Summary
8

Managing Software and Firmware Risks

  • Topic A: Manage General Software Risks
  • Topic B: Manage Risks Related to Software Installation and Configuration
  • Topic C: Manage Risks Related to Software Patches and Updates
  • Topic D: Manage Risks Related to IoT Device Operating Systems and Firmware
  • Summary
9

Promoting Physical Security

  • Topic A: Protect Local Memory and Storage
  • Topic B: Prevent Physical Port Access
  • Summary
A

Appendix A: Mapping CertNexus Certified Internet...tioner Exam ITS-110 Objectives to Course Content

1

Securing Web and Cloud Interfaces

  • Creating a New Inbound Rule
  • Exploiting LDAP-Based Authentication
  • Exploiting a Website Using SQL Injection
  • Using OWASP ZAP
2

Securing Data

  • Applying Symmetric Key Encryption
  • Using the MD5 Hash Algorithm
  • Using OpenSSL to Create a Public/Private Key Pair
  • Performing a MITM Attack
  • Performing a Memory-Based Attack
3

Securing IoT Networks

  • Performing ARP Spoofing
  • Spoofing MAC Address
  • Obtaining Information about Different IP Versions
  • Obtaining Hardware Information of a Network Adapter
  • Obtaining the ARP Cache
  • Obtaining the IP Version of a Network Adapter
  • Obtaining the IP Route Information from the IP Routing Table
  • Obtaining Information about the Net Firewall Profile
  • Getting the TCP Settings
  • Getting Information about the Current Connection Statistics of TCP
  • Getting Information about the TCP Ports
  • Getting the UDP Settings
  • Getting Information about the Current Connection Statistics of UDP
  • Getting Information about the UDP Ports
  • Scanning the Local Network

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

Certified Internet of Things Security Practitioner (CIoTSP)

$ 420.29

Buy Now

Related Courses

All Course
scroll to top