Learn how to build a risk-based IoT product security program.
Overview
Syllabus
Introduction
- Course and instructor introduction
- IoT then and now
- IoT product lifecycle: Part 1
- IoT product lifecycle: Part 2
- OWASP Top 10: Part 1
- OWASP Top 10: Part 2
- Foundations for success
- IoT product security program: Part 1
- IoT product security program: Part 2
- CPSO reporting structure: Part 1
- CPSO reporting structure: Part 2
- CPSO reporting structure: Part 3
- Supplier risk
- Contracts
- Case study: CCleaner
- First steps: Framework
- Architecture stages: Part 1
- Architecture stages: Part 2
- IoT ecosystems
- IoT communications: Part 1
- IoT communications: Part 2
- Foundations of trust: Part 1
- Foundations of trust: Part 2
- Foundations of trust: Part 3
- Foundations of trust: Part 4
- Encryption
- Trusted execution environment
- Trusted Platform Module: Part 1
- Trusted Platform Module: Part 2
- Trusted Platform Module: Part 3
- Trusted Platform Module: Part 4
- Hardware security
- DICE: Part 1
- DICE: Part 2
- Module 14 review
- Product design (hardware): Part 1
- Product design (hardware): Part 2
- Product design (hardware): Part 3
- Product design (software)
- IoT operating systems
- IoT Bill of Materials: Part 1
- IoT Bill of Materials: Part 2
- Manufacturing and provisioning
- Vulnerability management and patching: Part 1
- Vulnerability management and patching: Part 2
- Vulnerability Disclosure Program: Part 1
- Vulnerability Disclosure Program: Part 2
- Vulnerability Disclosure Program: Part 3
- Device ownership
- IOTSF Secure Design Best Practice Guides
- Data privacy: Part 1
- Data privacy: Part 2
- Reasonable security: A review of US law affecting IoT
- Global IoT laws: A review of international law affecting IoT
Taught by
Cybrary