This course presents Internet of Things (IoT) security concepts and practice. It starts by discussing IoT architecture, design and standards as well as security requirements and engineering for IoT. It describes various cyber-attacks on IoT devices and how to protect them. Therefore, this course explores the attacks targeted on connected devices, device-to-device (D2D) security and privacy, device authentication, device encryption/decryption technologies, and more with IoT systems. Furthermore, trust and privacy in IoT are explored.
Undergraduate 132 CRs
Russell, Brian, and Drew Van Duren, “Practical Internet of Things Security: A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world”. Packt Publishing Ltd.
content serial | Description |
---|
1 | Course outline, understanding IoT and implications of IoT security attacks |
2 | IoT Architecture and Core Modules - IoT Application Areas and Use Cases |
3 | IoT design, standards and Protocols |
4 | Security threats and vulnerabilities of IoT |
5 | Security Requirements in IoT Architecture |
6 | Security Engineering for IoT |
7 | IoT System Security Lifecycle |
8 | 7th week Assessment |
9 | Cryptographic fundamentals for IoT Security Engineering |
10 | Cryptographic fundamentals for IoT Security Engineering (cont.) |
11 | Identity and Access Management Solutions for IoT |
12 | 12th week Assessment |
13 | Identity and Access Management Solutions for IoT (cont.) |
14 | Trust and Privacy in IoT |
15 | Mitigating IoT privacy concerns |
Start your application