24 hours (usually 4 days including breaks)
There are no specific requirements needed to attend this course.
IoT security 101:
This course outlines the state of the art prevailing practices for IoT security and how this topic is
evolving. It is intended for IoT developers, managers to make strategic decision for their IoT product
both as a vendor and as a customer.
Course structure is 24 hours, 12 modules, 12x2 . Each module 2 hours.
Understanding IoT system risks & challenges
OSASP 2014, Top 10 security risk :
Understanding challenges of IoT security:
Massive deployments – Many simultaneous connections – Huge increase in data traffic
Constrained devices (Sensors, Actuators) – 16 KB RAM, 128 KB Flash, battery-driven
Low-Power Lossy Networks – 100 kbit/s, high packet loss ( ~ 20%) – Physical layer
packet size limited ( ~ 100 bytes) :
Too much network traffic – Too many messages • TLS: 2 round trips – Too large
messages • TLS certificates > 1 KB
Too much RAM needed – Example: Minimal TLS ~ 4 KB
Too large libraries required – Example: TLS has over 100 algorithm options → Standard
security needs profiling
4 Recent case studies of IoT hacking
Security issues in Industrial Internet of Thing ( IIOT )- how secure Industrial control network like PLC, DAC interacting with IoT systems
Security issues in Medical/Health care IoT system : Securing patients from IoT hackers
Security issues in Connected cars
IoT Security implementation case study and prevailing art from known IoT Platform
Legal issues in different verticals of IoT
Block Chain and IoT security :
Conventional security and privacy approaches tend tobe inapplicable for IoT, mainly due to its decentralized topology and the resource-constraints of
the majority of its devices. BlockChain (BC) that underpin the cryptocurrency Bitcoin have been
recently used to provide security and privacy in peer-to- peer networks with similar topologies to
IoT. However, BCs are computationally expensive and involve high bandwidth overhead and
delays, which are not suitable for IoT devices. Therefore new kind of BC approaches are evolving
for IoT security specially when control is involved. This module will touch the BC initiative in IoT
security with 3 case studies.
IoT security and standards: IETF, Most relevant for IoT: – ACE (Authorization and
Authentication in Constrained Environments) – CoRE (Constrained Restful Environments) – COSE
(CBOR Object Signing & Encryption). Existing standards – CoAP (Constrained Application
Protocol) • Similar to HTTP but for constrained devices – CBOR (Concise Binary Object
Representation) • Similar to JSON but binary and more compact Work in progress – COSE
(CBOR Object Signing and Encryption) • Securing CBOR objects – OSCoAP (Object Security for
Active areas of IoT security research, future and Q/A session.
I was benefit from some new and interesting ideas. Meeting and interacting with other attendees.
Course: IoT ( Internet of Things) for Entrepreneurs, Managers and Investors
I generally enjoyed the Hardtop Eco system.
Course: Big Data Business Intelligence for Govt. Agencies
I liked the exercises.
Rehrig Pacific COmpany
Course: Introduction to IoT Using Arduino
Ann is very knowledgeable on the subject. She is constantly varying pace according to the feedback. There is a lot of room for discussing attendee's own experiences. It was a great joy !.
Sjoerd Hulzinga - KPN p/a Bloomville
Course: IoT Security Architecture
It is one on one. I can ask a lot of question and also ask the trainner to repeat when I was not clear about some stuff.
Course: Insurtech: A Practical Introduction for Managers
We are looking to expand our presence in Israel!
If you are interested in running a high-tech, high-quality training and consulting business.Apply now!