CSSLP 2024: Security in Firmware & Industrial IoT

CSSLP 2024    |    Expert
  • 13 videos | 1h 45m 19s
  • Earns a Badge
Vast sectors like manufacturing, energy, the automotive industry, and medical devices are now powered by the Industrial Internet of Things, or IIoT. This course gives you the tools to manage the unique security considerations of these technologies. First, learn about the security of firmware and hardware device drivers, exploring vulnerabilities and studying famous attacks such as Stuxnet. Then, examine cognitive computing, AR/VR, IIoT, and specific attacks by Triton malware targeting IIoT systems. Next, explore Facilities IIoT and Automotive IIoT, focusing on infrastructure and vehicular systems security. Study famous security breaches, like the 2015 Jeep Cherokee hack, and then move on to robotics and medical devices IIoT. Learn about software-defined production considerations, including digital twins, sensor/actuator networks, and dynamic configuration management. After that, focus on security management interfaces, learning about their key components, such as SIEM and EDR systems. Then, explore the role of Out-of-Band (OOB) Management and log interfaces. Finally, examine application dependencies, assess the impact of protocol design choices and evaluate factors in API protocol design, particularly the choice between stateless and stateful protocols. This course prepares learners for the Certified Secure Software Lifecycle Professional (CSSLP) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Analyze security of firmware and hardware device drivers and enumerate famous attacks related to each
    Describe cognitive computing, ar/vr and industrial iot (iiot)
    Enumerate attacks geared at iiot and analyze famous iiot attacks
    Analyze special considerations in facilities management and automotive systems that use iiot and enumerate famous automotive security breaches
    Describe special considerations in iiot systems specializing in robotics and medical devices
    Elucidate security considerations unique to software-defined production techniques such as the use of digital twins, sensor/actuator networks, and dynamic configuration management
  • Define smis and list their components such as security information and event management (siem) and endpoint detection and response (edr) systems
    Examine the role of oob management and log interfaces in smis
    Identify upstream and downstream dependencies and contrast security concerns related to them
    Analyze the impact of protocol design choices on system security
    Evaluate factors in api protocol design and the choice of stateless vs. stateful protocols
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 2m 26s
    In this video, you will discover the key concepts covered in this course. FREE ACCESS
  • 9m 39s
    Discover how to analyze security of firmware and hardware device drivers and enumerate famous attacks related to each. FREE ACCESS
  • Locked
    3.  Cognitive Computing, AR/VR, and Industrial IoT
    11m 55s
    In this video, we will describe cognitive computing, AR/VR and Industrial IoT (IIoT). FREE ACCESS
  • Locked
    4.  Attacks on IIoT Systems
    7m 19s
    Upon completion of this video, you will be able to enumerate attacks geared at IIoT and analyze famous IIoT attacks. FREE ACCESS
  • Locked
    5.  Facilities IIoT and Automotive IIoT
    11m 46s
    Learn how to analyze special considerations in facilities management and automotive systems that use IIoT and enumerate famous automotive security breaches. FREE ACCESS
  • Locked
    6.  Robotics and Medical Devices IIoT
    10m 7s
    After completing this video, you will be able to describe special considerations in IIoT systems specializing in robotics and medical devices. FREE ACCESS
  • Locked
    7.  Security in Software-defined Production
    6m 57s
    Learn how to elucidate security considerations unique to software-defined production techniques such as the use of digital twins, sensor/actuator networks, and dynamic configuration management. FREE ACCESS
  • Locked
    8.  Security Management Interfaces (SMIs)
    10m 46s
    In this video, discover how to define SMIs and list their components such as security information and event management (SIEM) and endpoint detection and response (EDR) systems. FREE ACCESS
  • Locked
    9.  Out-of-Band (OOB) Management and Log Interfaces
    11m 5s
    During this video, you will learn how to examine the role of OOB management and log interfaces in SMIs. FREE ACCESS
  • Locked
    10.  Application Dependencies
    6m 59s
    Find out how to identify upstream and downstream dependencies and contrast security concerns related to them. FREE ACCESS
  • Locked
    11.  Protocol Design
    5m 31s
    In this video, find out how to analyze the impact of protocol design choices on system security. FREE ACCESS
  • Locked
    12.  API Protocol Design and State
    8m 21s
    Discover how to evaluate factors in API protocol design and the choice of stateless vs. stateful protocols. FREE ACCESS
  • Locked
    13.  Course Summary
    2m 28s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.9 of 7 users Rating 4.9 of 7 users (7)
Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)