Internet of Things Security

  • Cybersecurity |

Description

This course presents Internet of Things (IoT) security concepts and practice. It starts by discussing IoT architecture, design and standards as well as security requirements and engineering for IoT. It describes various cyber-attacks on IoT devices and how to protect them. Therefore, this course explores the attacks targeted on connected devices, device-to-device (D2D) security and privacy, device authentication, device encryption/decryption technologies, and more with IoT systems. Furthermore, trust and privacy in IoT are explored.

Program

Undergraduate 132 CRs

Objectives

  • - Understand fundamentals of Internet of Things (IoT), its use cases and the implications of security and privacy attacks.
    - Learn about attacks against IoT implementations and deployments at the various layers of IoT architecture.
    - Gain a deeper understanding of how to systematically identify security threats in IoT and discuss system security lifecycle
    - Deploy a simulation tool to develop security and privacy threats mitigation techniques

Textbook

Russell, Brian, and Drew Van Duren, “Practical Internet of Things Security: A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world”. Packt Publishing Ltd.

Course Content

content serial Description
1Course outline, understanding IoT and implications of IoT security attacks
2IoT Architecture and Core Modules - IoT Application Areas and Use Cases
3IoT design, standards and Protocols
4Security threats and vulnerabilities of IoT
5Security Requirements in IoT Architecture
6Security Engineering for IoT
7IoT System Security Lifecycle
87th week Assessment
9Cryptographic fundamentals for IoT Security Engineering
10Cryptographic fundamentals for IoT Security Engineering (cont.)
11Identity and Access Management Solutions for IoT
1212th week Assessment
13Identity and Access Management Solutions for IoT (cont.)
14Trust and Privacy in IoT
15Mitigating IoT privacy concerns

Markets and Career

  • Generation, transmission, distribution and utilization of electrical power for public and private sectors to secure both continuous and emergency demands.
  • Electrical power feeding for civil and military marine and aviation utilities.
  • Electrical works in construction engineering.

Start your application

Start The your journey to your new career.