Certified Internet of Things Security Practitioner (CIoTSP™): Exam ITS-110

Live Online (VILT) & Classroom Corporate Training Course

Certified IoT Practitioner edForce have signed partnership with Certnexus

Gain expertise in securing IoT ecosystems and prepare for the CIoTSP certification with this comprehensive course covering risk management, interface security, data protection, access control, and network security.

How can we help you?

Thanks for sharing your details. Our team will get in touch with you soon.
There was an error trying to send your message. Please try again later.

  • CloudLabs

  • Projects

  • Assignments

  • 24x7 Support

  • Lifetime Access

Certified Internet of Things Security Practitioner (CIoTSP™): Exam ITS-110

Overview

This course equips practitioners with a vendor-neutral skill set to design, implement, operate, and manage secure IoT ecosystems. It prepares individuals for the CertNexus Certified Internet of Things Security Practitioner (CIoTSP) certification through comprehensive training on IoT security and privacy.

Objectives

By the end of this course, leaner will be able to:

  • Understand and map the IoT attack surface to manage risks effectively.
  • Secure web and cloud interfaces by identifying and preventing common threats.
  • Utilize cryptography for data protection in motion, at rest, and in use.
  • Implement robust access control measures for IoT resources.
  • Ensure the security of various network types, including IP, wireless, mobile, and edge networks.

Prerequisites

  • Fundamental understanding of IoT ecosystems.
  • Completion of the Certified Internet of Things (IoT) Practitioner course (Exam ITP-110).

Course Outline

Module 1: Managing IoT Risks2024-02-18T14:40:07+05:30
  • Understand IoT attack surfaces
  • Implement security by design
Module 2: Securing Web and Cloud Interfaces2024-02-18T14:44:51+05:30
  • Identify and prevent common threats
  • Address injection, session management, XSS, CSRF, and redirection flaws
Module 3: Securing Data2024-02-18T14:48:23+05:30
  • Use cryptography appropriately
  • Protect data in motion, at rest, and in use
Module 4: Controlling Access to IoT Resources2024-02-18T14:49:58+05:30
  • Implement secure authentication and authorization
  • Monitor IoT systems for security breaches
Module 5: Securing IoT Networks2024-02-18T14:51:24+05:30
  • Ensure security across different network types
  • Focus on IP, wireless, mobile, and edge networks
2024-04-15T18:12:01+05:30

Go to Top