YoVDO

IoT Product Security

Offered By: LinkedIn Learning

Tags

Risk Management Courses Encryption Courses Hardware Security Courses IoT security Courses Data Privacy Courses Vulnerability Management Courses OWASP Top 10 Courses Trusted Platform Module Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn how to build a risk-based IoT product security program.

Syllabus

Introduction
  • Course and instructor introduction
  • IoT then and now
  • IoT product lifecycle: Part 1
  • IoT product lifecycle: Part 2
  • OWASP Top 10: Part 1
  • OWASP Top 10: Part 2
1. Product Security Programs
  • Foundations for success
  • IoT product security program: Part 1
  • IoT product security program: Part 2
  • CPSO reporting structure: Part 1
  • CPSO reporting structure: Part 2
  • CPSO reporting structure: Part 3
  • Supplier risk
  • Contracts
  • Case study: CCleaner
2. Security by Design
  • First steps: Framework
  • Architecture stages: Part 1
  • Architecture stages: Part 2
  • IoT ecosystems
  • IoT communications: Part 1
  • IoT communications: Part 2
3. Hardware Root of Trust
  • Foundations of trust: Part 1
  • Foundations of trust: Part 2
  • Foundations of trust: Part 3
  • Foundations of trust: Part 4
  • Encryption
  • Trusted execution environment
  • Trusted Platform Module: Part 1
  • Trusted Platform Module: Part 2
  • Trusted Platform Module: Part 3
  • Trusted Platform Module: Part 4
  • Hardware security
  • DICE: Part 1
  • DICE: Part 2
  • Module 14 review
4. Secure Development
  • Product design (hardware): Part 1
  • Product design (hardware): Part 2
  • Product design (hardware): Part 3
  • Product design (software)
  • IoT operating systems
  • IoT Bill of Materials: Part 1
  • IoT Bill of Materials: Part 2
5. Build, Ship, Operate
  • Manufacturing and provisioning
  • Vulnerability management and patching: Part 1
  • Vulnerability management and patching: Part 2
  • Vulnerability Disclosure Program: Part 1
  • Vulnerability Disclosure Program: Part 2
  • Vulnerability Disclosure Program: Part 3
  • Device ownership
  • IOTSF Secure Design Best Practice Guides
6. Privacy
  • Data privacy: Part 1
  • Data privacy: Part 2
  • Reasonable security: A review of US law affecting IoT
  • Global IoT laws: A review of international law affecting IoT

Taught by

Cybrary

Related Courses

Advanced Deployment Scenarios with TensorFlow
DeepLearning.AI via Coursera
AI for Good
DeepLearning.AI via Coursera
Artificial Intelligence Privacy and Convenience
LearnQuest via Coursera
Amazon Bedrock Getting Started (Korean)
Amazon Web Services via AWS Skill Builder
Artificial Intelligence (AI) In Healthcare: Opportunities and Challenges
Taipei Medical University via FutureLearn