{"id":870,"date":"2021-03-10T03:55:48","date_gmt":"2021-03-10T03:55:48","guid":{"rendered":"https:\/\/nltvcedu.com\/?page_id=870"},"modified":"2024-03-07T02:07:48","modified_gmt":"2024-03-07T02:07:48","slug":"certified-iot-security-silver","status":"publish","type":"page","link":"https:\/\/edu.nltvc.com\/?page_id=870","title":{"rendered":"Certified IoT Security Silver"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" style = \"text-align: center; padding: 30px 0 0;\">Certified IoT Security Silver<\/h2>\n\n\n\n<!DOCTYPE html>\n<html lang=\"en\">\n\n<head>\n    <meta charset=\"UTF-8\">\n\n    <style>\n        .main-tab{\n            padding: 40px;\n        }\n\n        .tab .title-tab{\n            background-image: linear-gradient(30deg, #4e4e4e, #5f5f5f, #676767, transparent);\n            padding: 15px;\n            border: 1px solid rgb(110, 110, 110);\n            border-top-left-radius: 10px;\n            border-top-right-radius: 10px;\n            \n        }\n\n        .tab .content{\n            padding: 15px;\n            background-color: gainsboro;\n            border: 1px solid rgb(110, 110, 110);\n            border-bottom-left-radius: 10px;\n            border-bottom-right-radius: 10px;\n        }\n\n        .tab .title{\n            margin: 0px;\n            font-family: Roboto;\n            font-size: 20px;\n            color: white;\n        }\n\n        .tab .text{\n            margin: 0px;\n        }\n\n        .course-container{\n            display :flex;\n            flex-wrap: wrap;\n            justify-content: center;\n        }\n\n        .tab .course{\n            padding : 12px;        \n            margin: 10px;\n            border: 1px solid black;\n            width : 400px;\n            max-width: 400px;\n            background-color: white;   \n        }\n\n        .course-title{\n            font-size: 20px!important;\n            font-family: Roboto;\n            font-weight: bold;\n        }\n    <\/style>\n<\/head>\n\n<body>\n    <div class = \"main-tab\">\n        <div class = \"tab\">\n            <div class = \"title-tab\">\n                <H2 class = \"title\">Introduction<\/H2>\n            <\/div> \n\n            <div class = \"content\">\n                <p class = \"text\">The ability to connect, communicate with, and remotely manage an incalculable number of networked, automated devices (approximately 26 Billion by 2020) via the Internet is becoming pervasive, from the factory floor to the hospital operating room to the residential basement. The transition from closed networks to enterprise IT networks to the public Internet is accelerating at an alarming pace\u2014and justly raising alarms about security. As we become increasingly reliant on intelligent, interconnected devices in every aspect of our lives, how do we protect potentially billions of them from intrusions and interference that could compromise personal privacy or threaten public safety?<br><\/br>\n                This training covers the basics and Intermediate levels of IoT landscape and takes you through IoT Security Challenges and vulnerabilities and teaches you the steps to hack and harden the IoT devices, applications and ecosystem.<\/p>\n        <\/div>\n    <br>\n        <div class = \"tab\">\n            <div class = \"title-tab\">\n                <H2 class = \"title\">Training Approach<\/H2>\n            <\/div> \n\n            <div class = \"content\">\n                <p class = \"text\">The training would involve both theory and practical led by the instructor. Easy to understand case study-based real-life approach. In depth knowledge from experienced trainer.<\/p>\n            <\/div>\n    <br>\n        <div class = \"tab\">    \n            <div class = \"title-tab\">\n                <H2 class = \"title\">Who Should Attend?<\/H2>\n            <\/div>\n\n            <div class = \"content\">\n                <p class=\"text\">This course is recommended for IoT Enthusiasts, IoT Designers, IoT Developers, IoT Implementers, IT Managers, IT Auditors and anyone who is ready to master the steps required to secure IOT Implementations.<\/p>\n            <\/div>\n        <\/div>\n    <br>\n        <div class = \"tab\">    \n            <div class = \"title-tab\">\n                <H2 class = \"title\">Prerequisites<\/H2>\n            <\/div>\n\n            <div class = \"content\">\n                <ol class = \"ungroup\"><li class = \"list\"> Should be involved in the IT field.<\/li>\n                                    <li>Should be familiar with using Windows, Linux and VMWare.<\/li>\n                                    <li>Should understand programming concepts, but programming experience is not mandatory.<\/li>\n                                    <li>Background knowledge in reverse code engineering and vulnerability assessment will be helpful, but not required.<\/li>\n                                    <li>Enthusiasm is a must.<\/li><\/ol>\n            <\/div>\n        <\/div>\n    <br>\n        <div class = \"tab\">\n            <div class = \"title-tab\">\n                <H2 class = \"title\">Duration<\/H2>\n            <\/div> \n\n            <div class = \"content\">\n                <p class = \"text\">4 days<\/p>\n            <\/div>\n    <br>\n        <div class = \"tab\">\n            <div class = \"title-tab\">\n                <H2 class = \"title\">Course Outline<\/H2>\n            <\/div>\n            <div class = \"content\">\n            <p class = \"text\">The following is the outline of the course:<\/p>\n            <div class = \"course-container\">\n                <div class = \"course\">\n                        <h2 class = \"course-title\">Overview of IOT technologies<\/h2>\n                    <ul>\n                        <li>What is IoT?<\/li>\n                        <li>IoT Architecture &#038; Ecosystem<\/li>\n                        <li>Hardware &#038; Software Platforms<\/li>\n                        <li>Communication Channels &#038; Protocols<\/li>\n                        <li>Cloud &#038; IoT<ul><li>Cloud &#038; RESTful Web Services<\/li><\/ul><\/li>\n                        <li>Data Streaming &#038; IoT<\/li>\n                        <li>IoT Myths<\/li>\n                        <li>IoT Applications<ul><li>Agriculture<\/li><li>Medical<\/li><li>Meteorology<\/li><\/ul><\/li>\n                        \n                    <\/ul>\n                <\/div>\n\n                <div class = \"course\">\n                        <h2 class = \"course-title\">IoT Vulnerabilities<\/h2>\n                    <ul>\n                        <li>Insecure Web Interface<\/li>\n                        <li>Insufficient Authentication\/Authorization<\/li>\n                        <li>Insecure Network Services<\/li>\n                        <li>Lack of Transport Encryption<\/li>\n                        <li>Privacy concerns<\/li>\n                        <li>Insecure Cloud Interface<\/li>\n                        <li>Insecure Mobile Interface<\/li>\n                        <li>Insufficient Security Configurability<\/li>\n                        <li>Insecure Software\/Firmware<\/li>\n                        <li>Poor Physical Security<\/li>\n                    <\/ul>\n\n                <\/div>\n                \n                <div class = \"course\">\n                        <h2 class = \"course-title\">IoT Security Overview<\/h2>\n                    <ul>\n                        <li>Overview of IOT Security<\/li>\n                        <li>IoT Threats<\/li>\n                        <li>Challenges to Secure IoT Deployments<\/li>\n                        <li>Types of IoT Attacks<\/li>\n\n                    <\/ul>\n\n                <\/div>\n    <\/div>\n    <div class = \"course-container\">\n                <div class = \"course\">\n                        <h2 class = \"course-title\">IoT Endpoint Security Guidelines<\/h2>\n                    <ul>\n                        <li>IoT Endpoint Security Challenges<\/li>\n                        <li>IoT Endpoint Security Model and Recommendations<\/li>\n                        <li>Secure the IoT Systems<\/li>\n                        <li>Securing the IoT Network<\/li>\n                        <li>IPv4 Based Security Guidelines<\/li>\n                        <li>IPv6 Based Security Guidelines<\/li>\n                        <li>Data Link Layer Based Network Guidelines<\/li>\n                    <\/ul>\n\n                <\/div>\n\n                <div class = \"course\">\n                        <h2 class = \"course-title\">Baseline Policies for IoT Security<\/h2>\n                    <ul>\n                        <li>IoT Security Controls Lifecyle<\/li>\n                        <li>Authentication \/ Authorization<\/li>\n                        <li>Logging &#038; Audit Framework<\/li>\n                        <li>Privacy by Design<\/li>\n                        <li>Data Protection Policies<\/li>\n                    <\/ul>\n                <\/div>\n\n                <div class = \"course\">\n                        <h2 class = \"course-title\">Hands On Lab<\/h2>\n                    <ul>\n                        <li>IoT Lab installation (install Kali Linux, install required tools)<\/li>\n                        <li>IoT OS (Windows) security test<\/li>\n                        <li>IoT OS (Linux) security test<\/li>\n                        <li>WiFi for IoT security test<\/li>\n                        <li>Bluetooth for IoT security test<\/li>\n                        <li>IoT vulnerability search engine<\/li>\n                    <\/ul>\n                <\/div>\n    <\/div>\n    <div class = \"course-container\">\n                <div class = \"course\">\n                        <h2 class = \"course-title\">IoT Security Recommendations<\/h2>\n                    <ul>\n                        <li>High Priority Security Recommendations<\/li>\n                        <li>Medium Priority Recommendations<\/li>\n                        <li>Low Priority Recommendations<\/li>\n                        <li>5G based IoT Endpoint Security Recommendations<\/li>\n                    \n                    <\/ul>\n                <\/div><div style=\"flex-wrap: wrap\"><\/div> \n    <\/div>\n\n                \n            <\/div> \n        <\/div>\n    <\/div>\n<\/body>\n\n<\/html>\n\n\n\n<p><strong>Disclaimer :<\/strong> Course contents are subject to change without prior notice<\/p>\n\n\n\n<!DOCTYPE html>\n<html lang = \"en\">\n    <head>\n        <meta charset = \"UTF-8\">\n\n        <style>\n            #up-tab{\n                border-radius: 50%;\n                background-color: rgba(57, 236, 164, 0.675);\n                width: 50px;\n                height: 50px;\n                position: fixed;\n                bottom: 20px;\n                right: 20px;\n                z-index: 11;\n                display: block;\n                margin-top: 0px;\n            }\n\n            #up-tab:hover{\n                cursor: pointer;\n            }\n\n            #up-tab:active{\n                cursor: grabbing;\n            }\n\n            #up{\n                width: 50px;\n                height: 50px;\n            }\n        <\/style>\n    <\/head>\n\n    <body>\n        <div id = \"up-tab\" onclick= \"backtotop()\">\n            <img id = \"up\" src = \"https:\/\/edu.nltvc.com\/wp-content\/uploads\/2024\/03\/arrowhead-up.png\">\n        <\/div>\n    <\/body>\n<\/html>\n\n<script>\n    window.onscroll = function(){backtotopbutton()}\n    window.addEventListener(\"scroll\", backtotopbutton)\n\n    window.onload = function() {\n        backtotopbutton();\n    };\n\n    function backtotopbutton(){\n        if(scrollY < 500){\n            document.getElementById(\"up-tab\").style.display = \"none\";\n        }\n        else{\n            document.getElementById(\"up-tab\").style.display = \"block\";\n        }\n    }\n\n    function backtotop(){\n        window.scrollTo({top: 0, behavior: \"smooth\"});\n    }\n<\/script>\n","protected":false},"excerpt":{"rendered":"<p>Certified IoT Security Silver Introduction The ability to connect, communicate with, and remotely manage an incalculable number of networked, automated devices (approximately 26 Billion by 2020) via the Internet is becoming pervasive, from the factory floor to the hospital operating room to the residential basement. The transition from closed networks to enterprise IT networks to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"templates\/full-width-page.php","meta":{"footnotes":""},"class_list":["post-870","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/edu.nltvc.com\/index.php?rest_route=\/wp\/v2\/pages\/870","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/edu.nltvc.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/edu.nltvc.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/edu.nltvc.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/edu.nltvc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=870"}],"version-history":[{"count":6,"href":"https:\/\/edu.nltvc.com\/index.php?rest_route=\/wp\/v2\/pages\/870\/revisions"}],"predecessor-version":[{"id":1521,"href":"https:\/\/edu.nltvc.com\/index.php?rest_route=\/wp\/v2\/pages\/870\/revisions\/1521"}],"wp:attachment":[{"href":"https:\/\/edu.nltvc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=870"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}