Become a Certified IoT Security Essentials I|SE

IoT Security Essentials I|SE

What Is EC-Council’s IoT Security Essentials?

EC-Council’s IoT Security Essentials Series provides comprehensive coverage of essential topics in securing Internet of Things (IoT) systems. From understanding the fundamental concepts of IoT to addressing advanced security threats, students will gain the knowledge and skills necessary to design, deploy, and maintain secure IoT solutions. Through a combination of theoretical learning and hands-on exercises, participants will explore IoT fundamentals, networking and communication protocols, cloud integration, threat intelligence, incident response, and security engineering principles. Put your newly acquired abilities to the test with an exhilarating Capture the Flag (CTF) Exercise seamlessly integrated in our Capstone project. This CTF is seamlessly integrated by live virtual machines, genuine software, and real networks, all delivered within a secure and regulated sandbox environment. With these exclusive hands-on, human-versus-machine CTF challenges you will develop the hands-on proficiencies essential for success in your cyber professional role.

Ultimately, students will be equipped with the expertise needed to effectively identify, assess, and mitigate security risks in IoT environments, ensuring the integrity, confidentiality, and availability of IoT systems and data.

IoT Security Essentials Program Information

Why EC-Council’s Essentials Series is the Most Popular and Fastest Growing Beginner Level Training Program for Career Starters and Career Changers

213,000+

Learners
Trust EC-Council’s
Essentials Series

150+

Countries

85+

Million Minutes
Watched

4.95/5.0

Average
Ratings

96.46%

of Learners
Gave a 5* Rating

IoT Security Essentials
Course Outline

Module 1: IoT Fundamentals

  • This module will introduce you to the basics of IoT and the different sectors where IoT is established.

Module 2: IoT Networking and Communication

This module will provide insights into the basics of networking concepts, the OSI Model, and
the TCP Model. It will also cover the IEEE IoT Standards List.

Module 3: IoT Processors and Operating Systems

This module will help you understand the hardware devices, processors, and operating systems
used in IoT.

Module 4: Cloud and IoT

This module will teach you about cloud computing, its characteristics, and the types of cloud
services.

Module 5: IoT Advanced Topics

This module will brief you about web communications, mobile applications, and native
applications.

Module 6: IoT Threats

This module will introduce you to some of the common IoT attacks, such as Mirai, BrikerBot,
Sybii, and Blackhole attacks.

Module 7: Basic Security

This module will discuss the CIA triangle, Wired Equivalent Privacy (WEP), Wi-Fi Protected
Access (WPA), and IoT security measures.

Module 8: Cloud Security

This module will discuss the state of cloud security, cloud vulnerabilities, NSA guidance, and
secure cloud computing.

Module 9: Threat Intelligence

This module will start with the topic of the National Vulnerability Database, covering US Cert,
Shodan, STRIDE, DREAD, PASTA, and CVSS.

Module 10: IoT Incident Response

This module will provide information on incident response in IoT, including standards,
processes, procedures, tools, and indicators of compromise.

Module 11: IoT Security Engineering

This module will cover the 12 practices of the Microsoft Secure Development Lifecycle and
Threat Modeling.

Module 12: Network Traffic Monitoring

Topics Covered:

  • Need and Advantages of Network Traffic Monitoring
  • Determine Baseline Traffic Signatures for Normal and Suspicious Network Traffic
  • Perform Network Monitoring for Suspicious Traffic

Lab Exercise

  • Capturing Network Traffic using Wireshark
  • Applying Various Filters in Wireshark
  • Analyzing and Examining Various Network Packet Headers in Linux using tcpdump