Certified Internet of Things Security Practitioner (CIoTSP)

Learn in-demand job skills for protecting IoT-enabled devices, networks, and data. Secure your future!

(ITS-110.AK1) / ISBN : 978-1-64459-207-6
Lessons
Lab
TestPrep
AI Tutor (Add-on)
158 Reviews
Get A Free Trial

About This Course

Certified Internet of Things Security Practitioner (CIoTSP) is a comprehensive preparatory course that helps you prepare for the CertNexus certification ITS-110. It is 100% aligned with the objectives to ensure that you are well-prepared for taking the IoT security certification exam.  The syllabus covers a wide range of topics from identifying vulnerabilities to implementing effective security measures. You’ll be exploring the IoT threat landscape, security by design principles, securing web & cloud interfaces, access control techniques, and more.

Skills You’ll Get

  • Awareness of IP network protocols, firewalls, intrusion detection systems (IDS), and intrusion prevention systems (IPS)
  • Knowledge of Wi-Fi network & mobile network vulnerabilities 
  • Understanding of security challenges at the edge of IoT networks
  • Expertise with cryptography algorithms: encryption, hashing, and digital signature techniques
  • Skilled at securing communication protocols & key management (creation & distribution)
  • Assess web application vulnerabilities, and deploy mitigation techniques
  • Understanding of cloud security principles, access control mechanisms & data protection
  • Familiarity with data protection techniques, data privacy regulations & privacy-by-design principles   
  • Skilled at IoT device security: device hardening, physical security & software-firmware security
  • Identify and prioritize security risks, and deploy incident response

 

1

Introduction

  • Course Description
  • How to Use This Course
2

Managing IoT Risks

  • Topic A: Map the IoT Attack Surface
  • Topic B: Build in Security by Design
  • Summary
3

Securing Web and Cloud Interfaces

  • Topic A: Identify Threats to IoT Web and Cloud Interfaces
  • Topic B: Prevent Injection Flaws
  • Topic C: Prevent Session Management Flaws
  • Topic D: Prevent Cross-Site Scripting Flaws
  • Topic E: Prevent Cross-Site Request Forgery Flaws
  • Topic F: Prevent Unvalidated Redirects and Forwards
  • Summary
4

Securing Data

  • Topic A: Use Cryptography Appropriately
  • Topic B: Protect Data in Motion
  • Topic C: Protect Data at Rest
  • Topic D: Protect Data in Use
  • Summary
5

Controlling Access to IoT Resources

  • Topic A: Identify the Need to Protect IoT Resources
  • Topic B: Implement Secure Authentication
  • Topic C: Implement Secure Authorization
  • Topic D: Implement Security Monitoring on IoT Systems
  • Summary
6

Securing IoT Networks

  • Topic A: Ensure the Security of IP Networks
  • Topic B: Ensure the Security of Wireless Networks
  • Topic C: Ensure the Security of Mobile Networks
  • Topic D: Ensure the Security of IoT Edge Networks
  • Summary
7

Ensuring Privacy

  • Topic A: Improve Data Collection to Reduce Privacy Concerns
  • Topic B: Protect Sensitive Data
  • Topic C: Dispose of Sensitive Data
  • Summary
8

Managing Software and Firmware Risks

  • Topic A: Manage General Software Risks
  • Topic B: Manage Risks Related to Software Installation and Configuration
  • Topic C: Manage Risks Related to Software Patches and Updates
  • Topic D: Manage Risks Related to IoT Device Operating Systems and Firmware
  • Summary
9

Promoting Physical Security

  • Topic A: Protect Local Memory and Storage
  • Topic B: Prevent Physical Port Access
  • Summary
A

Appendix A: Mapping CertNexus Certified Internet...tioner Exam ITS-110 Objectives to Course Content

1

Securing Web and Cloud Interfaces

  • Creating a New Inbound Rule
  • Exploiting LDAP-Based Authentication
  • Exploiting a Website Using SQL Injection
  • Using OWASP ZAP
2

Securing Data

  • Applying Symmetric Key Encryption
  • Using the MD5 Hash Algorithm
  • Using OpenSSL to Create a Public/Private Key Pair
  • Performing a MITM Attack
  • Performing a Memory-Based Attack
3

Securing IoT Networks

  • Performing ARP Spoofing
  • Spoofing MAC Address
  • Obtaining Information about Different IP Versions
  • Obtaining Hardware Information of a Network Adapter
  • Obtaining the ARP Cache
  • Obtaining the IP Version of a Network Adapter
  • Obtaining the IP Route Information from the IP Routing Table
  • Obtaining Information about the Net Firewall Profile
  • Getting the TCP Settings
  • Getting Information about the Current Connection Statistics of TCP
  • Getting Information about the TCP Ports
  • Getting the UDP Settings
  • Getting Information about the Current Connection Statistics of UDP
  • Getting Information about the UDP Ports
  • Scanning the Local Network

Any questions?
Check out the FAQs

Know more about our Certified Internet of Things Security Practitioner (CIoTSP) prep course, and the certification exam here.

Contact Us Now

All those wanting to learn IoT security techniques, enhance their cybersecurity skills and pass the CIoTSP certification exam should enroll in this course.

Yes, it is a beginner-friendly course. You’ll start with the fundamentals of IoT security and gradually move towards advanced topics.

IoT technology is a sought-after skill and the demand for skilled IoT security professionals is growing rapidly. Here are some exciting job roles you can pursue after this course:

  • IoT security analyst/consultant
  • Network Administrator
  • Software Development Engineer
  • Solution Architect
  • Web Developer
  • Cloud Engineer
  • Product Manager
  • Cybersecurity Analyst
  • Platform Engineer

Yes, this covers covers several advanced topics like cryptography, device hardening, software & firmware security, and more.

The exam has MCQ format that needs to be answered within 2 hours.

The passing score is 60%.

Related Courses

All Course
scroll to top