曙海教育集团
全国报名免费热线:4008699035 微信:shuhaipeixun
或15921673576(微信同号) QQ:1299983702
首页 课程表 在线聊 报名 讲师 品牌 QQ聊 活动 就业
 
SAP Financial Accounting and Controlling (FICO) for Consultants培训
 
   班级人数--热线:4008699035 手机:15921673576( 微信同号)
      增加互动环节, 保障培训效果,坚持小班授课,每个班级的人数限3到5人,超过限定人数,安排到下一期进行学习。
   授课地点及时间
上课地点:【上海】:同济大学(沪西)/新城金郡商务楼(11号线白银路站) 【深圳分部】:电影大厦(地铁一号线大剧院站)/深圳大学成教院 【北京分部】:北京中山学院/福鑫大楼 【南京分部】:金港大厦(和燕路) 【武汉分部】:佳源大厦(高新二路) 【成都分部】:领馆区1号(中和大道) 【广州分部】:广粮大厦 【西安分部】:协同大厦 【沈阳分部】:沈阳理工大学/六宅臻品 【郑州分部】:郑州大学/锦华大厦 【石家庄分部】:河北科技大学/瑞景大厦
开班时间(连续班/晚班/周末班):即将开课,详情请咨询客服!
   课时
     ◆资深工程师授课
        
        ☆注重质量 ☆边讲边练

        ☆若学员成绩达到合格及以上水平,将获得免费推荐工作的机会
        ★查看实.验.设.备详情,请点击此处★
   质量以及保障

      ☆ 1、如有部分内容理解不透或消化不好,可免费在以后培训班中重听;
      ☆ 2、在课程结束之后,授课老师会留给学员手机和E-mail,免费提供半年的课程技术支持,以便保证培训后的继续消化;
      ☆3、合格的学员可享受免费推荐就业机会。
      ☆4、合格学员免费颁发相关工程师等资格证书,提升您的职业资质。

课程大纲
 

1. Mod-1 :
Understanding IoT system risks & challenges

Disruption and Denial of Service attack
Vulnerability of API end points
Vulnerability of Gate way devices
Vulnerability of connected sensors and devices
Vulnerability of Gateway- Server communication
Vulnerability of Cloud services
2. Mod-2 :
OSASP 2014, Top 10 security risk :

I1 Insecure Web Interface
I2 Insufficient Authentication/Authorization
I3 Insecure Network Services
I4 Lack of Transport Encryption
I5 Privacy Concerns
I6 Insecure Cloud Interface
I7 Insecure Mobile Interface
I8 Insufficient Security Configurability
I9 Insecure Software/Firmware
I10 Poor Physical Security
References to OWASP and other related resources
3. Mod-3 :
Understanding challenges of IoT security:

Massive deployments – Many simultaneous connections – Huge increase in data traffic
Constrained devices (Sensors, Actuators) – 16 KB RAM, 128 KB Flash, battery-driven
Low-Power Lossy Networks – 100 kbit/s, high packet loss ( ~ 20%) – Physical layer
packet size limited ( ~ 100 bytes) :
Too much network traffic – Too many messages • TLS: 2 round trips – Too large
messages • TLS certificates > 1 KB
Too much RAM needed – Example: Minimal TLS ~ 4 KB
Too large libraries required – Example: TLS has over 100 algorithm options → Standard
security needs profiling

4. Mod-4 :
4 Recent case studies of IoT hacking

5. Mod-5 :
Security issues in Industrial Internet of Thing ( IIOT )- how secure Industrial control network like PLC, DAC interacting with IoT systems

6. Mod-6 :
Security issues in Medical/Health care IoT system : Securing patients from IoT hackers

7. Mod-7 :
Security issues in Connected cars

8. Mod-8 :
IoT Security implementation case study and prevailing art from known IoT Platform

AWS IoT standard for device authentication
Microsoft Azure IoT security standards
IBM IoT security standards
9. Mod-9 :
Legal issues in different verticals of IoT

Manufacturing
Healthcare
Connected Car
Service aggregation like Uber
Banking
10. Mod-10 :
Block Chain and IoT security :

Conventional security and privacy approaches tend tobe inapplicable for IoT, mainly due to its decentralized topology and the resource-constraints of
the majority of its devices. BlockChain (BC) that underpin the cryptocurrency Bitcoin have been
recently used to provide security and privacy in peer-to- peer networks with similar topologies to
IoT. However, BCs are computationally expensive and involve high bandwidth overhead and
delays, which are not suitable for IoT devices. Therefore new kind of BC approaches are evolving
for IoT security specially when control is involved. This module will touch the BC initiative in IoT
security with 3 case studies.

11. Mod-11 :
IoT security and standards: IETF, Most relevant for IoT: – ACE (Authorization and
Authentication in Constrained Environments) – CoRE (Constrained Restful Environments) – COSE
(CBOR Object Signing & Encryption). Existing standards – CoAP (Constrained Application
Protocol) • Similar to HTTP but for constrained devices – CBOR (Concise Binary Object
Representation) • Similar to JSON but binary and more compact  Work in progress – COSE
(CBOR Object Signing and Encryption) • Securing CBOR objects – OSCoAP (Object Security for
CoAP)

12. Mod-12 :
Active areas of IoT security research, future and Q/A session.

 
 
  备案号:沪ICP备08026168号 .(2014年7月11)...................
友情链接:Cadence培训 ICEPAK培训 PCB设计培训 adams培训 fluent培训系列课程 培训机构课程短期培训系列课程培训机构 长期课程列表实践课程高级课程学校培训机构周末班培训 南京 NS3培训 OpenGL培训 FPGA培训 PCIE培训 MTK培训 Cortex训 Arduino培训 单片机培训 EMC培训 信号完整性培训 电源设计培训 电机控制培训 LabVIEW培训 OPENCV培训 集成电路培训 UVM验证培训 VxWorks培训 CST培训 PLC培训 Python培训 ANSYS培训 VB语言培训 HFSS培训 SAS培训 Ansys培训 短期培训系列课程培训机构 长期课程列表实践课程高级课程学校培训机构周末班 曙海 教育 企业 学院 培训课程 系列班 长期课程列表实践课程高级课程学校培训机构周末班 短期培训系列课程培训机构 曙海教育企业学院培训课程 系列班