certcube iot security analyst

 

IOT SECURITY IS A UNIQUE COURSE DESIGNED THE ABILITY TO EVALUATE THE SAFETY OF THESE SMART DEVICES. common issues in IoT devices is that they are often resource-constrained and do not contain the compute resources necessary to implement strong security.

For example, sensors that monitor humidity or temperature cannot handle advanced encryption or other security measures. Plus, as many IoT devices are “set it and forget it” — placed in the field or on a machine and left until end of life — they hardly ever receive security updates or patches.

From a manufacturer’s viewpoint, building security in from the start can be costly, slow down development and cause the device not to function as it should. As such, many devices  failed to offer advanced security features.

THIS  IOt SECURITY TRAINING IS DRIVING INNOVATION BY PROTECTING DATA INTEGRITY, DATA CONFIDENTIALITY AND MAKE SURE IOT INFRASTRUCTURES CAN BE RESILIENT TO CYBERSECURITY RISKS.

REAL LIFE CASE STUDIES

INSTRUCTOR-LED SESSIONS

INDUSTRY DRIVEN CERTIFICATION

DAILY ASSIGNMENTS

STUDENT LEARNING KIT

 

syllabus

syllabus

module 1 : An Introduction to the Basics
  • Introduction of internet of things
  • IOT Architecture layers
  • IOT devices and technology
  • IOT  Protocols suite
  • IOT network architechure
  • IOT Applications & Insecuritites
  • OWASP IOT top 10 & Standerds
  • IOT attack surface areas
  • IOT Hardware &  components
  • Tools & Techniques
  • Hardware Communication Protocols
  • Embedded devices enumeration
  • Analyzing the interfaces and pinouts
  • Conventional Attack Vector

 

module 2 : radio frequency , bluetooth attacks
  • Introduction to Radio Communication Analysis
  • Types of radio frequency modules
  • Protocols in radio frequency Modules
  • Sniffing the radio packets
  • Jamming based attacks
  • BLE in IOT devices
    • Sniffing BLE packets
    • Modifying and sending own packets
    • Taking over an IzoT device using BLE
  • ZigBee – Versions and Security Issues
    • Zigbee packet sniffing
    • Replaying Zigbee packets
    • Additional exploitation possibilities in Radio
  • PII security analysis

.

 

module 3 : IOT hardware pentest
  • Analyzing Boards and chipsets
  • Identifying Serial Interfaces and Pinouts
  • UART Introduction and Interaction
  • Serial to Root
  • Introduction to SPI Flash
  • Dumping Firmware from a Real Device
  • JTAG – Introduction and finding pinouts
  • JTAG Enabling and Exploitation
  • Bypassing authentication using JTAG debugging
  • Firmware Dumping – via UART and JTAG Debug
  • USB Based Attack Vectors
  • Fuzzing IoT Devices
  • Side Channel and Timing Based Attacks overview
  • Industrial Grade IoT Ecosystem and Security Issues
  • Hardware Protections

 

module 4 : cloud and app pentest
  • Message Queue Telemetry Transport (MQTT)
  • Constrained Application Protocol (COAP)
  • Understanding COAP with Wireshark
  • web dashboard vulnerbilites
  • Mobile application security issues identification
  • Introduction to Android Native Devices
  • Exploitation for Android and iOS
  • API based security issues
  • Cloud-based and vulnerabilities in the backend systems
  • How to Defend Against IoT Hacking
  • General Guidelines for IoT Device Manufacturing Companies
  • OWASP Top 10 IoT Vulnerabilities Solutions

 

who should attend this training?
  • Freshers

  • Ethical hackers

  • System Administrators

  • Network Administrators

  • Engineers

  • Web admins

  • Auditors

  • Security Professionals

why should i take this training?

The era of the technology is now growing every day but due to dependency on the technology cyber frauds and attacks are also increased so to take defense for yourself and your business this is best suitable training to take entry in this domain.

pri-requisite of the training ?

The person should familiar with basic computer operations 

IoT Security Analyst inquiry

8 + 7 =

Our clients

Testimonials

Today I’ve completed my one 2 one online training by Mr Naresh sir from Certcube Labs .
This is the first time I have attended a class in this format and wondered how effective it would be. It was very effective and therefore I would definitely be interested in attending other classes in the same format. The instructor was very knowlegeable and provided a wealth of information about the current version, especially since the last version I used was several releases ago.
Satyam Singh

BCA, Delhi University

A good place to learn every small detail in cybersecurity.Really nice and helpful teacher.

subhum

Btech, BITS Mesra

together Let’s Create the future

2 + 7 =