Security is a vital component in all Internet of Things (IoT) solutions. Because data is the essence of IoT devices and analytics, learning to implement and identify secure solutions is the best way to proactively ensure the safety and security of your IoT data.
In this training, you learn the key tenets of securing an IoT solution. Through introduction, examples, and hands-on exercises, you learn about secure IoT architecture and designs; how to ensure authentication by trusted devices; how to restrict connected devices to perform only the functions that they are authorized to perform; and how to use secure communication methods that ensure that the information reaches its intended target.
You learn the security concepts used in an IoT environment, and through interactive exercises and demonstrations, you build a foundational knowledge of IoT security that will allow you to successfully discuss security topics and further engage in the advanced IoT security learning path courses.
Intended Audience
This course is intended for:
- Business decision maker
- Security architect
- Fleet manager
- Device engineer
- Line of business application developer
Course Objectives
In this course, you will learn how to:
- Describe the key tenets to apply when designing a secure IoT solution
- Explain common vulnerabilities within an IoT solution
- Design a simple, secure IoT solution based on the information provided
- Identify vulnerabilities within a fictitious IoT solution
- Explore AWS Identity and Access Management (IAM) and IoT policies to provide secure IoT authorization
- Describe the processes required to provide secure communication between AWS IoT Core and devices in the field
- Explain AWS IoT suggested best practices for a secure IoT solution
Prerequisites
We recommend that attendees of this course have the following prerequisites:
- IoT Foundation: Telemetry
Delivery Method
This course is delivered through a mix of:
- Digital training
- Video demonstration
Hands-On Activity
Video demonstrations will illustrate concepts learned in the module and allow you to see the concepts in action.
Duration
- 3 hours
Course Outline
This course covers the following concepts:
Module 1: IoT Security Introduction
- Introduction to IoT security
- Shared responsibility model and IoT
- AWS compliance programs
Module 2: Architecture
- Designing a secure architecture
- AWS Well-Architected Framework
- IoT hardware
- Student Exercise: University library and IoT
- Best practices for architecture
Module 3: Authentication
- Introduction to authentication
- Certificates
- Federated users
- Demo: Create and associate an IoT thing with a certificate
- Best practices for authentication
Module 4: Authorization
- Introduction to authorization
- IAM roles and IoT
- Policies
- Demo: Create and associate an IoT policy with a certificate
- Best practices for authorization
Module 5: Securing Data
- Introduction to secure data and communications
- Securing communications
- Securing data at rest
- Securing data in transit
- Student exercise: AWS IoT manufacturing design
- Best practices for securing data
Module 6: Monitoring
- Introduction to monitoring
- Amazon CloudWatch
- AWS CloudTrail
- Intro to AWS IoT Device Defender
- Demo: Viewing IoT data in Amazon CloudWatch and AWS CloudTrail
- Best practices for monitoring