0   reviews on AWS training

AWS IoT Security Primer

Security is a vital component in all Internet of Things (IoT) solutions. Because data is the essence of IoT devices and analytics, learning to implement and identify secure solutions is the best way to proactively ensure the safety and security of your IoT data. In this course, you will learn the key tenets of securing an IoT solution. Through introduction, examples, and hands-on exercises, you learn about secure IoT architecture and designs; how to ensure authentication by trusted devices; how to restrict connected devices to perform only the functions that they are authorized to perform; and how to use secure communication methods that ensure that the information reaches its intended target. You learn the security concepts used in an IoT environment, and through interactive exercises and demonstrations, you build a foundational knowledge of IoT security that will allow you to successfully discuss security topics and further engage in the advanced IoT security learning path courses.
Course from AWS training
 0 students enrolled
 en

Security is a vital component in all Internet of Things (IoT) solutions. Because data is the essence of IoT devices and analytics, learning to implement and identify secure solutions is the best way to proactively ensure the safety and security of your IoT data.

In this training, you learn the key tenets of securing an IoT solution. Through introduction, examples, and hands-on exercises, you learn about secure IoT architecture and designs; how to ensure authentication by trusted devices; how to restrict connected devices to perform only the functions that they are authorized to perform; and how to use secure communication methods that ensure that the information reaches its intended target.

You learn the security concepts used in an IoT environment, and through interactive exercises and demonstrations, you build a foundational knowledge of IoT security that will allow you to successfully discuss security topics and further engage in the advanced IoT security learning path courses.

Intended Audience

This course is intended for:      • Business decision maker      • Security architect      • Fleet manager      • Device engineer      • Line of business application developer

Course Objectives

In this course, you will learn how to:      • Describe the key tenets to apply when designing a secure IoT solution      • Explain common vulnerabilities within an IoT solution      • Design a simple, secure IoT solution based on the information provided      • Identify vulnerabilities within a fictitious IoT solution      • Explore AWS Identity and Access Management (IAM) and IoT policies to provide secure IoT authorization      • Describe the processes required to provide secure communication between AWS IoT Core and devices in the field      • Explain AWS IoT suggested best practices for a secure IoT solution

Prerequisites

We recommend that attendees of this course have the following prerequisites:      • IoT Foundation: Telemetry

Delivery Method

This course is delivered through a mix of:      • Digital training      • Video demonstration

Hands-On Activity

Video demonstrations will illustrate concepts learned in the module and allow you to see the concepts in action.

Duration

3 hours

Course Outline

This course covers the following concepts:      • Module 1: IoT Security Introduction         o Introduction to IoT security         o Shared responsibility model and IoT         o AWS compliance programs      • Module 2: Architecture         o Designing a secure architecture         o AWS Well-Architected Framework         o IoT hardware         o Student Exercise: University library and IoT         o Best practices for architecture      • Module 3: Authentication         o Introduction to authentication         o Certificates         o Federated users         o Demo: Create and associate an IoT thing with a certificate         o Best practices for authentication      • Module 4: Authorization         o Introduction to authorization         o IAM roles and IoT         o Policies         o Demo: Create and associate an IoT policy with a certificate         o Best practices for authorization      • Module 5: Securing Data         o Introduction to secure data and communications         o Securing communications         o Securing data at rest         o Securing data in transit         o Student exercise: AWS IoT manufacturing design         o Best practices for securing data      • Module 6: Monitoring         o Introduction to monitoring         o Amazon CloudWatch         o AWS CloudTrail         o Intro to AWS IoT Device Defender         o Demo: Viewing IoT data in Amazon CloudWatch and AWS CloudTrail         o Best practices for monitoring

AWS IoT Security Primer
Free
per course
Also check at

FAQs About "AWS IoT Security Primer"

About

Elektev is on a mission to organize educational content on the Internet and make it easily accessible. Elektev provides users with online course details, reviews and prices on courses aggregated from multiple online education providers.
DISCLOSURE: This page may contain affiliate links, meaning when you click the links and make a purchase, we receive a commission.

SOCIAL NETWORK