IoT Product Security
Offered By: LinkedIn Learning
Course Description
Overview
Learn how to build a risk-based IoT product security program.
Syllabus
Introduction
- Course and instructor introduction
- IoT then and now
- IoT product lifecycle: Part 1
- IoT product lifecycle: Part 2
- OWASP Top 10: Part 1
- OWASP Top 10: Part 2
- Foundations for success
- IoT product security program: Part 1
- IoT product security program: Part 2
- CPSO reporting structure: Part 1
- CPSO reporting structure: Part 2
- CPSO reporting structure: Part 3
- Supplier risk
- Contracts
- Case study: CCleaner
- First steps: Framework
- Architecture stages: Part 1
- Architecture stages: Part 2
- IoT ecosystems
- IoT communications: Part 1
- IoT communications: Part 2
- Foundations of trust: Part 1
- Foundations of trust: Part 2
- Foundations of trust: Part 3
- Foundations of trust: Part 4
- Encryption
- Trusted execution environment
- Trusted Platform Module: Part 1
- Trusted Platform Module: Part 2
- Trusted Platform Module: Part 3
- Trusted Platform Module: Part 4
- Hardware security
- DICE: Part 1
- DICE: Part 2
- Module 14 review
- Product design (hardware): Part 1
- Product design (hardware): Part 2
- Product design (hardware): Part 3
- Product design (software)
- IoT operating systems
- IoT Bill of Materials: Part 1
- IoT Bill of Materials: Part 2
- Manufacturing and provisioning
- Vulnerability management and patching: Part 1
- Vulnerability management and patching: Part 2
- Vulnerability Disclosure Program: Part 1
- Vulnerability Disclosure Program: Part 2
- Vulnerability Disclosure Program: Part 3
- Device ownership
- IOTSF Secure Design Best Practice Guides
- Data privacy: Part 1
- Data privacy: Part 2
- Reasonable security: A review of US law affecting IoT
- Global IoT laws: A review of international law affecting IoT
Taught by
Cybrary
Related Courses
Hardware SecurityUniversity of Maryland, College Park via Coursera Information Security- II
Indian Institute of Technology Madras via Swayam Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam Cybersecurity
University of Maryland, College Park via Coursera Learning Mobile Device Security
LinkedIn Learning