Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. Cybrary
  4. IoT Product Security

IoT Product Security

This course will focus on the fundamentals of how to set up a functioning IoT product security program from the perspective of a company that designs, manufactures, and sells IoT and IIoT devices for consumer or industrial use.

Provider Information

More courses from this provider:
Contact Information

Will Carlson
Cybrary
4600 River Rd
Suite 400
Riverdale Park, MD 20737

Course Overview

Overall Proficiency Level
3 - Advanced
Course Prerequisites

This course assumes the learner has a strong foundation of security engineering concepts, security management practices, and business leadership principles and can apply these concepts in a leadership capacity.

Training Purpose
Skill Development
Specific Audience
All
General Public
Delivery Method
Online, Self-Paced
  • Online, Self-Paced

Learning Objectives

By the end of this course, students should be able to:
- Design and build a risk-based IoT product security program to securely develop, manufacture, deliver, and support IoT and Industrial IoT (IIoT) devices throughout their product lifecycle
- Understand what existing security program elements CISOs can leverage to implement an IoT product security program and identify the new elements that need to be added
- Identify principles of hardware roots of trust and develop an understanding of how to help guide product engineers to securely design IoT products
- Understand how to design secure elements and hardware roots of trust including TEE, TPM, HSM, and DICE
- Understand how CISOs should manage risk associated with existing IoT, IIoT, Industrial Control Systems (ICS), and Operational Technology (OT) systems within the context of their existing security program
- Learn how to create a Vulnerability Disclosure Program using tools such as bug bounties and responsible disclosure
- Understand how to secure the IoT device provisioning and manufacturing practices including a robust examination of security considerations for chip manufacturers, IoT device OEMs, and contract manufacturers
- Learn relevant legal and regulatory changes affecting the global IoT market, and identify steps organizations should consider to meet the changing security and privacy environment
- Apply security knowledge gained by study of CISSP, CISM, CRISC, etc. to the real world scenarios contained in the course material and discussions

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Work Roles

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov(link sends email). Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

Last Published Date:

You have been selected to participate in a brief survey about your experience today with National Initiative for Cybersecurity Careers and Studies.

Would you like to participate in our survey?

If you accept you will be leaving the National Initiative for Cybersecurity Careers and Studies website and going to a third party site.
That site may have different privacy, security and accessibility policies than the National Initiative for Cybersecurity Careers and Studies site.
National Initiative for Cybersecurity Careers and Studies does not endorse any commercial products, services, programs or content on the third party website.
Thank you for visiting our site. We hope your visit was informative and enjoyable.