Course Outline
Introduction to IoT Security for Government
Overview of IoT Technologies for Government
Understanding the Basic IoT Architecture for Government
Understanding Major Security Risks and Issues in IoT for Government
- IoT Vulnerabilities for Government
- IoT Security Challenges for Government
- Building Awareness of Attacks in IoT for Government
Exploring Domain-Specific IoT Architectures for Government
- eHealth IoT Security Architecture for Government
- Industrial IoT Security Architecture for Government
Security Architectures of Proximity Network Services for Government
- Wi-Fi
- BLE
- SigFox
- LoRaWAN
- NB-IoT
Designing Security into IoT for Government
- IoT Authentication and Authorization for Government
- IoT Data Integrity for Government
- IoT Security Standards for Government
- Architecting IoT Security Domains for Government
- Using IoT Services for Government
Working with Technologies for IoT Security for Government
- IoT Network Security
- Bayshore Networks
- Cisco
- Darktrace
- Senrio
- IoT Authentication
- Baimos Technologies
- Covisint
- Device Authority
- Entrust Datacard
- Gemalto
- IoT Encryption
- Cisco
- Entrust Datacard
- Gemalto
- HPE
- Lynx Software Technologies
- Symantec
- IoT PKI
- DigiCert
- Entrust Datacard
- Gemalto
- HPE
- Symantec
- WISeKey
- IoT Security Analytics
- Cisco
- Indegy
- Kaspersky Lab
- SAP
- Senrio
- IoT API Security
- Akana
- Apigee/Google
- Axway
- CA Technologies
- Mashery/TIBCO
- MuleSoft
- WSO2
Updating Your Organization's IoT Architecture for Security in Government
Choosing the Right IoT Security Technologies for Your Organization for Government
Summary and Conclusion for Government
Requirements
- Basic understanding of the Internet of Things (IoT)
Audience
- IT Professionals for government and private sectors
- Developers
- Engineers
- Managers
Testimonials (3)
Very knowledgeable trainer, was able to adjust to audience knowledge, excellent industry experience and ability to relate to audience needs Excellent content preparation , tailored to needs discussed beforehand. Good supplement reading materials prepared by trainer
Oliver Steinig - Bosch
Course - IoT Security Architecture
Level of expertise from the trainer Use case examples
Pierre Maillot - Bosch
Course - IoT Security Architecture
Ann is very knowledgeable on the subject. She is constantly varying pace according to the feedback. There is a lot of room for discussing attendee's own experiences. It was a great joy !.