Security Engineering for the IoT

Security Engineering for the IoT

English | MP4 | AVC 1920×1080 | AAC 44KHz 2ch | 2h 14m | 365 MB

In a step by step manner learn design techniques, applied cryptography and secure cloud connectivity.

The Internet of Things (IoT),an emerging global interconnection of billions of smart devices, will collect increasing amounts of private and sensitive data about our lives, and requires increasing levels of reliability and trustworthiness with respect to confidentiality, integrity, and availability.This video course will cover security engineering approaches for IoT systems. We will discuss approaches for securely designing and hardening IoT endpoints and systems. This video tutorial will give you the information you need to implement a secure system design methodology within an organization. You will examine what is required to securely design an IoT device, how to integrate your existing security services to protect an IoT system, how to select technologies that support your security endeavors, and negotiate security agreements with IoT providers. Your will then cover in-depth approaches to applying cryptographic solutions, identity and access management solutions, and key management solutions for IoT systems.

You’ll also explore case study of the approaches to identity management taken within the Connected Vehicle market and discuss the interesting role that biometrics can play in securing IoT devices.This video tutorial will also teach you to securely connect to the cloud, process and store data in the cloud, and integrate cloud security services for your IoT system. By the end of this course, you will have learned to ensure the security of your organization’s data through design techniques, applied cryptography, and secure cloud connectivity.

A step by step approach to Security engineering for the IoT. Learn Cryptographic solutions, identity, access management solutions and key management solutions for IoT systems

What You Will Learn

  • Effective techniques for managing cryptographic keys for IoT systems.
  • Learn how to integrate cryptographic modules in IoT systems
  • Get a grip of Why and how safety should be considered in IoT system implementations
  • Integrating your existing security services to protect an IoT system
  • Dive into the fundamentals of Cryptography, Key Management and Implementing cryptography
  • Security Credential Management System (SCSM) was developed to support the connected car market
  • Explore securing connecting to the cloud, processing and storing data in the cloud, and integrating cloud security services for your IoT system
Table of Contents

01 The Course Overview
02 Secure IoT System Design
03 Security System Integration for the IoT
04 Integrating Safety into the Design Process
05 Processes and Agreements
06 Technology Selection
07 Fundamentals of Cryptography
08 Cryptographic Modules
09 Cryptographic Key Management
10 Implementing Cryptography Within the IoT
11 Case Study – New Approaches – Blockchain for the IoT
12 The Device Identity Lifecycle
13 In Depth – The Bootstrap Process
14 Case Study – Connected Vehicles
15 IAM Infrastructure
16 Authorization and Access Control
17 New Approaches – Applying Biometrics
18 Introduction to Cloud Services for the IoT
19 Cloud Security Architecture – Microsoft Azure
20 Cloud Security Architecture – Amazon Web Services
21 Cloud Security Architecture – IBM Watson IoT Platform
22 Hands-on – Connect an IoT Device to Amazon Web Services