COURSE

IoT Product Security

Course

As with the regular Internet, the Internet of Things (IoT) is increasingly targeted in malicious attacks. If you are a CISO or security director for an organization that produces IoT or IIoT products, you should take this advanced IoT Product Security course so you can build a risk-based IoT product security program in this quickly evolving field.
Full access included with 
Insider Pro
 and 
Teams

8

H

10

M
Time

advanced

i
Designed for learners who have no prior work experience in IT or Cybersecurity, but are interested in starting a career in this exciting field.
Designed for learners with prior cybersecurity work experience who are interested in advancing their career or expanding their skillset.
Designed for learners with a solid grasp of foundational IT and cybersecurity concepts who are interested in pursuing an entry-level security role.
Experience Level

8

i

Earn qualifying credits for certification renewal with completion certificates provided for submission.
CEU's

Enrollees

Learners at 96% of Fortune 1000 companies trust Cybrary

About this course

Read More

Skills you'll gain

Course Outline

1
Course Introduction
0
H
49
Min
1
Product Security Programs
1
H
22
Min
1
Security by Design
0
H
55
Min
1
Hardware Root of Trust
2
H
13
Min
1
Secure Development
1
H
3
Min
1
Build, Ship, Operate
1
H
10
Min
1
Privacy
0
H
38
Min

Manufacturing and Provisioning

Free

10m

Product Design (Hardware) Part 1

Free

8m

First Steps: Framework

Free

8m

Course and Instructor Introduction

Free

7m

Foundations for Success

Free

10m

Data Privacy Part 1

Free

11m

Vulnerability Management and Patching Part 1

Free

10m

Product Design (Hardware) Part 2

Free

7m

Architecture Stages Part 1

Free

8m

IoT Product Security Program Part 1

Free

9m

IoT Then and Now

Free

9m

Data Privacy Part 2

Free

10m

Vulnerability Management and Patching Part 2

Free

12m

Product Design (Hardware) Part 3

Free

10m

IoT Architecture Stages Part 2

Free

10m

IoT Product Security Program Part 2

Free

10m

IoT Product Lifecycle Part 1

Free

8m

Reasonable Security: A Review of US Law Affecting IoT

Free

10m

Vulnerability Disclosure Program Part 1

Free

7m

Product Design (Software)

Free

8m

IoT Ecosystems

Free

9m

IoT Product Lifecycle Part 2

Free

7m

CPSO Reporting Structure Part 1

Free

7m

Global IoT Laws: A Review of International Law Affecting IoT

Free

8m

Vulnerability Disclosure Program Part 2

Free

8m

IoT Operating Systems

Free

10m

Encryption

Free

8m

IoT Communications Part 1

Free

10m

OWASP Top 10 Part 1

Free

9m

CPSO Reporting Structure Part 2

Free

7m

IoT Bill of Materials Part 1

Free

10m

Vulnerability Disclosure Program Part 3

Free

8m

Trusted Execution Environment

Free

8m

IoT Communications Part 2

Free

10m

CPSO Reporting Structure Part 3

Free

11m

OWASP Top 10 Part 2

Free

10m

IoT Bill of Materials Part 2

Free

10m

Device Ownership

Free

8m

Trusted Platform Module Part 1

Free

8m

Supplier Risk

Free

10m

IOTSF Secure Design Best Practice Guides

Free

7m

Trusted Platform Module Part 2

Free

8m

Contracts

Free

10m

Case Study: CCleaner

Free

10m

Trusted Platform Module Part 4

Free

13m

Hardware Security

Free

10m

DICE Part 1

Free

8m

DICE Part 2

Free

10m

Module 14 Review

Free

10m

Course Description

This course, taught from the perspective of a CISO or a senior director in either a security or engineering organization, will focus on the information required to design and implement an IoT product security program. The topics discussed in this course will apply to any Information Security Program trying to understand how to securely handle IoT, IIoT, ICS, and OT technology within the enterprise. By better understanding the underlying security concerns of designing and manufacturing IoT devices, security practitioners can better understand how to secure these devices within their environments.

The IoT security field is maturing and changing at an incredible rate. At the same time, IoT is expanding into our everyday lives and will continue to have an increasing impact on how we live our lives. Threat actors understand this and see the immature industry as an opportunity to do evil.

This class is designed for senior-level security professionals and assumes the learner has knowledge of advanced security concepts, experience leading security or engineering organizations, and is comfortable with business risk and governance concepts. The class is organized in a way to help organizations stand up an IoT product security program; however, any learner with a desire to understand how to apply cyber security principles to IoT security will benefit from the material in this class.

This class takes a deep technical dive into designing and establishing a secure foundation of trust within the IoT device and ecosystem architecture. The class will take a deep technical dive into roots of trust, anchors of trust, secure boot, and managed boot with an in-depth discussion of secure elements and hardware roots of trust, including TEE, TPM, HSM, and DICE. It discusses the steps an organization can take to develop a product security program to address IoT security, including factors of success, reporting structures, and which elements of the existing information security program that can be incorporated and enhanced for product security. This class discusses how an organization can proactively develop tools to address IoT vulnerabilities, such as developing an enterprise vulnerability disclosure program using tools such as bug bounties and responsible disclosure. It discusses hot topics, such as third-party risk, IoT physical and logical security, OTA patching, architecture frameworks, and IoT manufacturing considerations in foreign markets. The class will identify secure IoT device provisioning and manufacturing practices, including a robust examination of security considerations for chip manufacturers, IoT device OEMs, and contract manufacturers. This class also discusses relevant legal and regulatory changes affecting the global IoT market and steps organizations should consider to meet the changing security and privacy environment. Lastly, this class uses real-world case studies and goes behind the news headlines to discuss how organizations can take steps today to prevent becoming tomorrow's next Internet meme.

Prerequisites

This course assumes the learner has a strong foundation of security engineering concepts, security management practices, and business leadership principles and can apply these concepts in a leadership capacity.

Course Goals

By the end of this course, students should be able to:

  • Design and build a risk-based IoT product security program to securely develop, manufacture, deliver, and support IoT and Industrial IoT (IIoT) devices throughout their product lifecycle
  • Understand what existing security program elements CISOs can leverage to implement an IoT product security program and identify the new elements that need to be added
  • Identify principles of hardware roots of trust and develop an understanding of how to help guide product engineers to securely design IoT products
  • Understand how to design secure elements and hardware roots of trust including TEE, TPM, HSM, and DICE
  • Understand how CISOs should manage risk associated with existing IoT, IIoT, Industrial Control Systems (ICS), and Operational Technology (OT) systems within the context of their existing security program
  • Learn how to create a Vulnerability Disclosure Program using tools such as bug bounties and responsible disclosure
  • Understand how to secure the IoT device provisioning and manufacturing practices including a robust examination of security considerations for chip manufacturers, IoT device OEMs, and contract manufacturers
  • Learn relevant legal and regulatory changes affecting the global IoT market, and identify steps organizations should consider to meet the changing security and privacy environment
  • * Apply security knowledge gained by study of CISSP, CISM, CRISC, etc. to the real world scenarios contained in the course material and discussions

    Train Your Team

    Cybrary’s expert-led cybersecurity courses help your team remediate skill gaps and get up-to-date on certifications. Utilize Cybrary to stay ahead of emerging threats and provide team members with clarity on how to learn, grow, and advance their careers within your organization.

    Included in a Path

    Instructors

    Matthew Clark
    Global Security Leader (CISO)
    Read Full Bio
    Learn

    Learn core concepts and get hands-on with key skills.

    Practice

    Exercise your problem-solving and creative thinking skills with security-centric puzzles

    Prove

    Assess your knowledge and skills to identify areas for improvement and measure your growth

    Get Hands-on Learning

    Put your skills to the test in virtual labs, challenges, and simulated environments.

    Measure Your Progress

    Track your skills development from lesson to lesson using the Cybrary Skills Tracker.

    Connect with the Community

    Connect with peers and mentors through our supportive community of cybersecurity professionals.

    Success from Our Learners

    "Becoming a Cybrary Insider Pro was a total game changer. Cybrary was instrumental in helping me break into cybersecurity, despite having no prior IT experience or security-related degree. Their career paths gave me clear direction, the instructors had real-world experience, and the virtual labs let me gain hands-on skills I could confidently put on my resume and speak to in interviews."

    Cassandra

    Information Security Analyst/Cisco Systems

    "I was able to earn both my Security+ and CySA+ in two months. I give all the credit to Cybrary. I’m also proud to announce I recently accepted a job as a Cyber Systems Engineer at BDO... I always try to debunk the idea that you can't get a job without experience or a degree."

    Casey

    Cyber Systems Engineer/BDO

    "Cybrary has helped me improve my hands-on skills and pass my toughest certification exams, enabling me to achieve 13 advanced certifications and successfully launch my own business. I love the practice tests for certification exams, especially, and appreciate the wide-ranging training options that let me find the best fit for my goals"

    Angel

    Founder,/ IntellChromatics.

    "Cybrary really helped me get up to speed and acquire a baseline level of technical knowledge. It offers a far more comprehensive approach than just learning from a book. It actually shows you how to apply cybersecurity processes in a hands-on way"

    Don Gates

    Principal Systems Engineer/SAIC

    "Cybrary’s SOC Analyst career path was the difference maker, and was instrumental in me landing my new job. I was able to show the employer that I had the right knowledge and the hands-on skills to execute the role."

    Cory

    Cybersecurity analyst/

    "I was able to earn my CISSP certification within 60 days of signing up for Cybrary Insider Pro and got hired as a Security Analyst conducting security assessments and penetration testing within 120 days. This certainly wouldn’t have been possible without the support of the Cybrary mentor community."

    Mike

    Security Engineer and Pentester/

    "Becoming a Cybrary Insider Pro was a total game changer. Cybrary was instrumental in helping me break into cybersecurity, despite having no prior IT experience or security-related degree. Their career paths gave me clear direction, the instructors had real-world experience, and the virtual labs let me gain hands-on skills I could confidently put on my resume and speak to in interviews."

    Cassandra

    Information Security Analyst/Cisco Systems

    "I was able to earn both my Security+ and CySA+ in two months. I give all the credit to Cybrary. I’m also proud to announce I recently accepted a job as a Cyber Systems Engineer at BDO... I always try to debunk the idea that you can't get a job without experience or a degree."

    Casey

    Cyber Systems Engineer/BDO

    "Cybrary has helped me improve my hands-on skills and pass my toughest certification exams, enabling me to achieve 13 advanced certifications and successfully launch my own business. I love the practice tests for certification exams, especially, and appreciate the wide-ranging training options that let me find the best fit for my goals"

    Angel

    Founder,/ IntellChromatics.

    IoT Product Security

    As with the regular Internet, the Internet of Things (IoT) is increasingly targeted in malicious attacks. If you are a CISO or security director for an organization that produces IoT or IIoT products, you should take this advanced IoT Product Security course so you can build a risk-based IoT product security program in this quickly evolving field.
    8
    10
    M
    Time
    advanced
    difficulty
    8
    ceu/cpe

    Course Content

    Course Description

    This course, taught from the perspective of a CISO or a senior director in either a security or engineering organization, will focus on the information required to design and implement an IoT product security program. The topics discussed in this course will apply to any Information Security Program trying to understand how to securely handle IoT, IIoT, ICS, and OT technology within the enterprise. By better understanding the underlying security concerns of designing and manufacturing IoT devices, security practitioners can better understand how to secure these devices within their environments.

    The IoT security field is maturing and changing at an incredible rate. At the same time, IoT is expanding into our everyday lives and will continue to have an increasing impact on how we live our lives. Threat actors understand this and see the immature industry as an opportunity to do evil.

    This class is designed for senior-level security professionals and assumes the learner has knowledge of advanced security concepts, experience leading security or engineering organizations, and is comfortable with business risk and governance concepts. The class is organized in a way to help organizations stand up an IoT product security program; however, any learner with a desire to understand how to apply cyber security principles to IoT security will benefit from the material in this class.

    This class takes a deep technical dive into designing and establishing a secure foundation of trust within the IoT device and ecosystem architecture. The class will take a deep technical dive into roots of trust, anchors of trust, secure boot, and managed boot with an in-depth discussion of secure elements and hardware roots of trust, including TEE, TPM, HSM, and DICE. It discusses the steps an organization can take to develop a product security program to address IoT security, including factors of success, reporting structures, and which elements of the existing information security program that can be incorporated and enhanced for product security. This class discusses how an organization can proactively develop tools to address IoT vulnerabilities, such as developing an enterprise vulnerability disclosure program using tools such as bug bounties and responsible disclosure. It discusses hot topics, such as third-party risk, IoT physical and logical security, OTA patching, architecture frameworks, and IoT manufacturing considerations in foreign markets. The class will identify secure IoT device provisioning and manufacturing practices, including a robust examination of security considerations for chip manufacturers, IoT device OEMs, and contract manufacturers. This class also discusses relevant legal and regulatory changes affecting the global IoT market and steps organizations should consider to meet the changing security and privacy environment. Lastly, this class uses real-world case studies and goes behind the news headlines to discuss how organizations can take steps today to prevent becoming tomorrow's next Internet meme.

    Prerequisites

    This course assumes the learner has a strong foundation of security engineering concepts, security management practices, and business leadership principles and can apply these concepts in a leadership capacity.

    Course Goals

    By the end of this course, students should be able to:

  • Design and build a risk-based IoT product security program to securely develop, manufacture, deliver, and support IoT and Industrial IoT (IIoT) devices throughout their product lifecycle
  • Understand what existing security program elements CISOs can leverage to implement an IoT product security program and identify the new elements that need to be added
  • Identify principles of hardware roots of trust and develop an understanding of how to help guide product engineers to securely design IoT products
  • Understand how to design secure elements and hardware roots of trust including TEE, TPM, HSM, and DICE
  • Understand how CISOs should manage risk associated with existing IoT, IIoT, Industrial Control Systems (ICS), and Operational Technology (OT) systems within the context of their existing security program
  • Learn how to create a Vulnerability Disclosure Program using tools such as bug bounties and responsible disclosure
  • Understand how to secure the IoT device provisioning and manufacturing practices including a robust examination of security considerations for chip manufacturers, IoT device OEMs, and contract manufacturers
  • Learn relevant legal and regulatory changes affecting the global IoT market, and identify steps organizations should consider to meet the changing security and privacy environment
  • * Apply security knowledge gained by study of CISSP, CISM, CRISC, etc. to the real world scenarios contained in the course material and discussions

    This course is part of a Career Path:
    No items found.

    Instructed by

    Provider
    Cybrary Logo
    Certification Body
    Certificate of Completion

    Complete this entire course to earn a IoT Product Security Certificate of Completion