Course Outline
Introduction to IoT Security for Government
Overview of IoT Technologies for Government
Understanding the Basic IoT Architecture for Government
Understanding Major Security Risks and Issues in IoT for Government
- IoT Vulnerabilities for Government
- IoT Security Challenges for Government
- Building Awareness of Attacks in IoT for Government
Exploring Domain-Specific IoT Architectures for Government
- eHealth IoT Security Architecture for Government
- Industrial IoT Security Architecture for Government
Security Architectures of Proximity Network Services for Government
- Wi-Fi for Government
- BLE for Government
- SigFox for Government
- LoRaWAN for Government
- NB-IoT for Government
Designing Security into IoT for Government
- IoT Authentication and Authorization for Government
- IoT Data Integrity for Government
- IoT Security Standards for Government
- Architecting IoT Security Domains for Government
- Using IoT Services for Government
Working with Technologies for IoT Security for Government
- IoT Network Security for Government
- Bayshore Networks for Government
- Cisco for Government
- Darktrace for Government
- Senrio for Government
- IoT Authentication for Government
- Baimos Technologies for Government
- Covisint for Government
- Device Authority for Government
- Entrust Datacard for Government
- Gemalto for Government
- IoT Encryption for Government
- Cisco for Government
- Entrust Datacard for Government
- Gemalto for Government
- HPE for Government
- Lynx Software Technologies for Government
- Symantec for Government
- IoT PKI for Government
- DigiCert for Government
- Entrust Datacard for Government
- Gemalto for Government
- HPE for Government
- Symantec for Government
- WISeKey for Government
- IoT Security Analytics for Government
- Cisco for Government
- Indegy for Government
- Kaspersky Lab for Government
- SAP for Government
- Senrio for Government
- IoT API Security for Government
- Akana for Government
- Apigee/Google for Government
- Axway for Government
- CA Technologies for Government
- Mashery/TIBCO for Government
- MuleSoft for Government
- WSO2 for Government
Updating Your Organization's IoT Architecture for Security in the Public Sector
Choosing the Right IoT Security Technologies for Your Organization for Government
Summary and Conclusion for Government
Requirements
- Basic understanding of the Internet of Things (IoT)
Audience for government
- IT Professionals
- Developers
- Engineers
- Managers
Testimonials (3)
Very knowledgeable trainer, was able to adjust to audience knowledge, excellent industry experience and ability to relate to audience needs Excellent content preparation , tailored to needs discussed beforehand. Good supplement reading materials prepared by trainer
Oliver Steinig - Bosch
Course - IoT Security Architecture
Level of expertise from the trainer Use case examples
Pierre Maillot - Bosch
Course - IoT Security Architecture
Ann is very knowledgeable on the subject. She is constantly varying pace according to the feedback. There is a lot of room for discussing attendee's own experiences. It was a great joy !.