CSSLP 2024: Security in Firmware & Industrial IoT
CSSLP 2024
| Expert
- 13 videos | 1h 45m 19s
- Earns a Badge
Vast sectors like manufacturing, energy, the automotive industry, and medical devices are now powered by the Industrial Internet of Things, or IIoT. This course gives you the tools to manage the unique security considerations of these technologies. First, learn about the security of firmware and hardware device drivers, exploring vulnerabilities and studying famous attacks such as Stuxnet. Then, examine cognitive computing, AR/VR, IIoT, and specific attacks by Triton malware targeting IIoT systems. Next, explore Facilities IIoT and Automotive IIoT, focusing on infrastructure and vehicular systems security. Study famous security breaches, like the 2015 Jeep Cherokee hack, and then move on to robotics and medical devices IIoT. Learn about software-defined production considerations, including digital twins, sensor/actuator networks, and dynamic configuration management. After that, focus on security management interfaces, learning about their key components, such as SIEM and EDR systems. Then, explore the role of Out-of-Band (OOB) Management and log interfaces. Finally, examine application dependencies, assess the impact of protocol design choices and evaluate factors in API protocol design, particularly the choice between stateless and stateful protocols. This course prepares learners for the Certified Secure Software Lifecycle Professional (CSSLP) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseAnalyze security of firmware and hardware device drivers and enumerate famous attacks related to eachDescribe cognitive computing, ar/vr and industrial iot (iiot)Enumerate attacks geared at iiot and analyze famous iiot attacksAnalyze special considerations in facilities management and automotive systems that use iiot and enumerate famous automotive security breachesDescribe special considerations in iiot systems specializing in robotics and medical devicesElucidate security considerations unique to software-defined production techniques such as the use of digital twins, sensor/actuator networks, and dynamic configuration management
-
Define smis and list their components such as security information and event management (siem) and endpoint detection and response (edr) systemsExamine the role of oob management and log interfaces in smisIdentify upstream and downstream dependencies and contrast security concerns related to themAnalyze the impact of protocol design choices on system securityEvaluate factors in api protocol design and the choice of stateless vs. stateful protocolsSummarize the key concepts covered in this course
IN THIS COURSE
-
2m 26sIn this video, you will discover the key concepts covered in this course. FREE ACCESS
-
9m 39sDiscover how to analyze security of firmware and hardware device drivers and enumerate famous attacks related to each. FREE ACCESS
-
11m 55sIn this video, we will describe cognitive computing, AR/VR and Industrial IoT (IIoT). FREE ACCESS
-
7m 19sUpon completion of this video, you will be able to enumerate attacks geared at IIoT and analyze famous IIoT attacks. FREE ACCESS
-
11m 46sLearn how to analyze special considerations in facilities management and automotive systems that use IIoT and enumerate famous automotive security breaches. FREE ACCESS
-
10m 7sAfter completing this video, you will be able to describe special considerations in IIoT systems specializing in robotics and medical devices. FREE ACCESS
-
6m 57sLearn how to elucidate security considerations unique to software-defined production techniques such as the use of digital twins, sensor/actuator networks, and dynamic configuration management. FREE ACCESS
-
10m 46sIn this video, discover how to define SMIs and list their components such as security information and event management (SIEM) and endpoint detection and response (EDR) systems. FREE ACCESS
-
11m 5sDuring this video, you will learn how to examine the role of OOB management and log interfaces in SMIs. FREE ACCESS
-
6m 59sFind out how to identify upstream and downstream dependencies and contrast security concerns related to them. FREE ACCESS
-
5m 31sIn this video, find out how to analyze the impact of protocol design choices on system security. FREE ACCESS
-
8m 21sDiscover how to evaluate factors in API protocol design and the choice of stateless vs. stateful protocols. FREE ACCESS
-
2m 28sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.