Developing Secure Internet of Things Applications
Hands-on practice with thorough explanations, presentations, demos, small standalone exercises during the training.
A 1-3 days seminar for Developers, testers, QA, team leaders, project managers, database admins
This training is for
Developers
Project managers
Testers
Database admins
QA
Team leaders
GET COMPREHENSIVE TRAINING FOR YOUR TEAM
Agenda
1. IT Security Overview
Industry trends
CVE/NVD databases
Foundations of Security
Footprinting, Scanning, Enumeration, System Hacking
Cryptography
Pentesting
Social Engineering
2. Web-based Attacks Methodology
Footprinting the Infrastructure
Defense in Depth
Attacking Web Servers & Applications
Authentication Mechanisms
Authorization Schemes
Session Management
Injection Attacks
Man-in-the-Middle Attacks
Data Connectivity
Web App Clients
Web Services
3. OWASP Internet of Things Top 10
OWASP IoT Project Overview
Risk Rating Methodology
1 Insecure Web Interface
2 Insufficient Authentication/Authorization
3 Insecure Network Services
4 Lack of Transport Encryption
5 Privacy Concerns
6 Insecure Cloud Interface
7 Insecure Mobile Interface
8 Insufficient Security Configurability
9 Insecure Software/Firmware
10 Poor Physical Security