PAC | Security Engineering For The IoT (2018 EN)

Discussion in 'Information Technology' started by Kanka, Jul 22, 2019.

  1. Kanka

    Kanka Well-Known Member Loyal User

    Messages:
    16,047
    Likes Received:
    449
    Trophy Points:
    83
    [​IMG]

    Company: Packt Publishing
    Author: Brian Russell
    Full Title: Security Engineering For The IoT
    Year: 2018
    Language: English
    Genre: Educational: Cloud Computing
    Skill Level: -
    Price: €124.99
    -
    Files: MP4
    Time: 02:09:44
    Video: AVC, 1920 x 1080 (1.778) at 29.970 fps, 450 kbps
    Audio: AAC at 160 Kbps, 2 channels, 48.0 KHz



    In a step by step manner learn design techniques, applied cryptography and secure cloud connectivity.

    The Internet of Things (IoT),an emerging global interconnection of billions of smart devices, will collect increasing amounts of private and sensitive data about our lives, and requires increasing levels of reliability and trustworthiness with respect to confidentiality, integrity, and availability.This video course will cover security engineering approaches for IoT systems. We will discuss approaches for securely designing and hardening IoT endpoints and systems. This video tutorial will give you the information you need to implement a secure system design methodology within an organization. You will examine what is required to securely design an IoT device, how to integrate your existing security services to protect an IoT system, how to select technologies that support your security endeavors, and negotiate security agreements with IoT providers. Your will then cover in-depth approaches to applying cryptographic solutions, identity and access management solutions, and key management solutions for IoT systems.

    You'll also explore case study of the approaches to identity management taken within the Connected Vehicle market and discuss the interesting role that biometrics can play in securing IoT devices.This video tutorial will also teach you to securely connect to the cloud, process and store data in the cloud, and integrate cloud security services for your IoT system. By the end of this course, you will have learned to ensure the security of your organization's data through design techniques, applied cryptography, and secure cloud connectivity.

    Style and Approach
    A step by step approach to Security engineering for the IoT. Learn Cryptographic solutions, identity, access management solutions and key management solutions for IoT systems


    Learn:
    ✓ Effective techniques for managing cryptographic keys for IoT systems.
    ✓ Learn how to integrate cryptographic modules in IoT systems
    ✓ Get a grip of Why and how safety should be considered in IoT system implementations
    ✓ Integrating your existing security services to protect an IoT system
    ✓ Dive into the fundamentals of Cryptography, Key Management and Implementing cryptography
    ✓ Security Credential Management System (SCSM) was developed to support the connected car market
    ✓ Explore securing connecting to the cloud, processing and storing data in the cloud, and integrating cloud security services for your IoT system

    Features:
    ✓ Deep dive applying cryptographic solutions, identity and access management solutions and key management solutions for IoT systems
    ✓ This course will be filled with practical examples learn the techniques and methodologies of building and securing robust Internet of Things (IoT) systems.
    ✓ Secure Connections to the Cloud that include Azure, AWS and Watson IoT Platform.


    Lessons:
    1. Securely Designing IoT Things and Systems
    01. The Course Overview
    02. Secure IoT System Design
    03. Security System Integration for the IoT
    04. Integrating Safety into the Design Process
    05. Processes and Agreements
    06. Technology Selection
    2. Cryptographic Approaches for the IoT
    07. Fundamentals of Cryptography
    08. Cryptographic Modules
    09. Cryptographic Key Management
    10. Implementing Cryptography Within the IoT
    11. Case Study: New Approaches – Blockchain for the IoT
    3. Identity and Access Management for the IoT
    12. The Device Identity Lifecycle
    13. In Depth: The Bootstrap Process
    14. Case Study: Connected Vehicles
    15. IAM Infrastructure
    16. Authorization and Access Control
    17. New Approaches: Applying Biometrics
    4. Secure Connections to the Cloud
    18. Introduction to Cloud Services for the IoT
    19. Cloud Security Architecture – Microsoft Azure
    20. Cloud Security Architecture – Amazon Web Services
    21. Cloud Security Architecture – IBM Watson IoT Platform


    -------------