Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

IoT Product Security

via LinkedIn Learning

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn how to build a risk-based IoT product security program.

Syllabus

Introduction
  • Course and instructor introduction
  • IoT then and now
  • IoT product lifecycle: Part 1
  • IoT product lifecycle: Part 2
  • OWASP Top 10: Part 1
  • OWASP Top 10: Part 2
1. Product Security Programs
  • Foundations for success
  • IoT product security program: Part 1
  • IoT product security program: Part 2
  • CPSO reporting structure: Part 1
  • CPSO reporting structure: Part 2
  • CPSO reporting structure: Part 3
  • Supplier risk
  • Contracts
  • Case study: CCleaner
2. Security by Design
  • First steps: Framework
  • Architecture stages: Part 1
  • Architecture stages: Part 2
  • IoT ecosystems
  • IoT communications: Part 1
  • IoT communications: Part 2
3. Hardware Root of Trust
  • Foundations of trust: Part 1
  • Foundations of trust: Part 2
  • Foundations of trust: Part 3
  • Foundations of trust: Part 4
  • Encryption
  • Trusted execution environment
  • Trusted Platform Module: Part 1
  • Trusted Platform Module: Part 2
  • Trusted Platform Module: Part 3
  • Trusted Platform Module: Part 4
  • Hardware security
  • DICE: Part 1
  • DICE: Part 2
  • Module 14 review
4. Secure Development
  • Product design (hardware): Part 1
  • Product design (hardware): Part 2
  • Product design (hardware): Part 3
  • Product design (software)
  • IoT operating systems
  • IoT Bill of Materials: Part 1
  • IoT Bill of Materials: Part 2
5. Build, Ship, Operate
  • Manufacturing and provisioning
  • Vulnerability management and patching: Part 1
  • Vulnerability management and patching: Part 2
  • Vulnerability Disclosure Program: Part 1
  • Vulnerability Disclosure Program: Part 2
  • Vulnerability Disclosure Program: Part 3
  • Device ownership
  • IOTSF Secure Design Best Practice Guides
6. Privacy
  • Data privacy: Part 1
  • Data privacy: Part 2
  • Reasonable security: A review of US law affecting IoT
  • Global IoT laws: A review of international law affecting IoT

Taught by

Cybrary

Reviews

4.8 rating at LinkedIn Learning based on 28 ratings

Start your review of IoT Product Security

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.