• Online, Instructor-Led
  • Classroom
Course Description

In this course, Students continue working with IoT devices. Students connect devices and analyze firmware and software for weaknesses. Students research and perform upgrades to IoT devices. After upgrading the IoT devices, the students secure these devices by applying industry best practices. This may include changing firewall settings or remote access settings. Upon completion of this course, students can recognize, update and secure IoT devices.

Learning Objectives

Investigate the purpose and characteristics of firmware.
Examine the basic principles of threat modeling.
Explore threat modeling software.
Examine firmware properties.
Examine IoT mobile applications to exploit common vulnerabilities.
Explain IoT device hacking.
Explore Software Defined Radio (SDR).
Analyze firmware security best practices.
Compare the methods used to secure hardware.

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.