YoVDO

IoT Product Security

Offered By: LinkedIn Learning

Tags

Risk Management Courses Encryption Courses Hardware Security Courses IoT security Courses Data Privacy Courses Vulnerability Management Courses OWASP Top 10 Courses Trusted Platform Module Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn how to build a risk-based IoT product security program.

Syllabus

Introduction
  • Course and instructor introduction
  • IoT then and now
  • IoT product lifecycle: Part 1
  • IoT product lifecycle: Part 2
  • OWASP Top 10: Part 1
  • OWASP Top 10: Part 2
1. Product Security Programs
  • Foundations for success
  • IoT product security program: Part 1
  • IoT product security program: Part 2
  • CPSO reporting structure: Part 1
  • CPSO reporting structure: Part 2
  • CPSO reporting structure: Part 3
  • Supplier risk
  • Contracts
  • Case study: CCleaner
2. Security by Design
  • First steps: Framework
  • Architecture stages: Part 1
  • Architecture stages: Part 2
  • IoT ecosystems
  • IoT communications: Part 1
  • IoT communications: Part 2
3. Hardware Root of Trust
  • Foundations of trust: Part 1
  • Foundations of trust: Part 2
  • Foundations of trust: Part 3
  • Foundations of trust: Part 4
  • Encryption
  • Trusted execution environment
  • Trusted Platform Module: Part 1
  • Trusted Platform Module: Part 2
  • Trusted Platform Module: Part 3
  • Trusted Platform Module: Part 4
  • Hardware security
  • DICE: Part 1
  • DICE: Part 2
  • Module 14 review
4. Secure Development
  • Product design (hardware): Part 1
  • Product design (hardware): Part 2
  • Product design (hardware): Part 3
  • Product design (software)
  • IoT operating systems
  • IoT Bill of Materials: Part 1
  • IoT Bill of Materials: Part 2
5. Build, Ship, Operate
  • Manufacturing and provisioning
  • Vulnerability management and patching: Part 1
  • Vulnerability management and patching: Part 2
  • Vulnerability Disclosure Program: Part 1
  • Vulnerability Disclosure Program: Part 2
  • Vulnerability Disclosure Program: Part 3
  • Device ownership
  • IOTSF Secure Design Best Practice Guides
6. Privacy
  • Data privacy: Part 1
  • Data privacy: Part 2
  • Reasonable security: A review of US law affecting IoT
  • Global IoT laws: A review of international law affecting IoT

Taught by

Cybrary

Related Courses

TPM-FAIL - TPM Meetings Timing and Lattice Attacks
TheIACR via YouTube
Look at ME! - Intel ME Investigation
media.ccc.de via YouTube
Hacking With a TPM
media.ccc.de via YouTube
What Is Needed to Build Trusted Infrastructures
Red Hat via YouTube
Keylime - An Open Source TPM Project for Remote Trust
Linux Foundation via YouTube