Security Engineering for the IoT [Video]

More Information
Learn
  • Effective techniques for managing cryptographic keys for IoT systems.
  • Learn how to integrate cryptographic modules in IoT systems
  • Get a grip of Why and how safety should be considered in IoT system implementations
  • Integrating your existing security services to protect an IoT system
  • Dive into the fundamentals of Cryptography, Key Management and Implementing cryptography
  • Security Credential Management System (SCSM) was developed to support the connected car market
  • Explore securing connecting to the cloud, processing and storing data in the cloud, and integrating cloud security services for your IoT system
About

The Internet of Things (IoT),an emerging global interconnection of billions of smart devices, will collect increasing amounts of private and sensitive data about our lives, and requires increasing levels of reliability and trustworthiness with respect to confidentiality, integrity, and availability.This video course will cover security engineering approaches for IoT systems. We will discuss approaches for securely designing and hardening IoT endpoints and systems. This video tutorial will give you the information you need to implement a secure system design methodology within an organization. You will examine what is required to securely design an IoT device, how to integrate your existing security services to protect an IoT system, how to select technologies that support your security endeavors, and negotiate security agreements with IoT providers. Your will then cover in-depth approaches to applying cryptographic solutions, identity and access management solutions, and key management solutions for IoT systems.

You'll also explore case study of the approaches to identity management taken within the Connected Vehicle market and discuss the interesting role that biometrics can play in securing IoT devices.This video tutorial will also teach you to securely connect to the cloud, process and store data in the cloud, and integrate cloud security services for your IoT system. By the end of this course, you will have learned to ensure the security of your organization's data through design techniques, applied cryptography, and secure cloud connectivity.

Style and Approach

A step by step approach to Security engineering for the IoT. Learn Cryptographic solutions, identity, access management solutions and key management solutions for IoT systems

Features
  • Deep dive applying cryptographic solutions, identity and access management solutions and key management solutions for IoT systems
  • This course will be filled with practical examples learn the techniques and methodologies of building and securing robust Internet of Things (IoT) systems.
  • Secure Connections to the Cloud that include Azure, AWS and Watson IoT Platform.
Course Length 2 hours 14 minutes
ISBN 9781788622615
Date Of Publication 4 Apr 2018

Authors

Brian Russell

Brian Russell is the founder of TrustThink, LLC, where he leads multiple efforts towards the development of trusted IoT solutions. He has over 20 years of information security experience and has led complex system security engineering programs in the areas of cryptographic modernization, cryptographic key management, unmanned aerial systems, and connected vehicle security. He is the co-chair of the Cloud Security Alliance (CSA) IoT Working Group and was the recipient of the 2015 and 2016 CSA Ron Knode Service Award. Brian is an adjunct professor at the University of San Diego (USD) in the Cyber Security Operations and Leadership program.