Developing Secure Internet of Things Applications

Hands-on practice with thorough explanations, presentations, demos, small standalone exercises during the training.
A 1-3 days seminar for Developers, testers, QA, team leaders, project managers, database admins

What you’ll learn

This training is for

Developers

Project managers

Testers

Database admins

QA

Team leaders

GET COMPREHENSIVE TRAINING FOR YOUR TEAM

Agenda

1. IT Security Overview

Industry trends

CVE/NVD databases

Foundations of Security

Footprinting, Scanning, Enumeration, System Hacking

Cryptography

Pentesting

Social Engineering

2. Web-based Attacks Methodology

Footprinting the Infrastructure

Defense in Depth

Attacking Web Servers & Applications

Authentication Mechanisms

Authorization Schemes

Session Management

Injection Attacks

Man-in-the-Middle Attacks

Data Connectivity

Web App Clients

Web Services

3. OWASP Internet of Things Top 10

OWASP IoT Project Overview

Risk Rating Methodology

1 Insecure Web Interface

2 Insufficient Authentication/Authorization

3 Insecure Network Services

4 Lack of Transport Encryption

5 Privacy Concerns

6 Insecure Cloud Interface

7 Insecure Mobile Interface

8 Insufficient Security Configurability

9 Insecure Software/Firmware

10 Poor Physical Security

GET COMPREHENSIVE TRAINING FOR YOUR TEAM

Get exclusive offers and the latest updates on our upcoming events

You have Successfully Subscribed!

Pin It on Pinterest