Clientele ➞

Implementing Cyber Security for IoT


Duration: 2 Days


With the growth of IoT industry, security is becoming a huge concern for enterprises desiring to implement IoT solutions as a part of their business. Cyber Security Professionals are finding it difficult to plan and manage security as security challenges with IT is very different than with IoT. New hardware platforms, uncommon processor architectures and new communication protocols are adding up the vulnerabilities. This course helps understand the best strategies to be discussed and used in security planning and maintaining secured operations. One of the most important topics include Threat Modeling and Penetration Testing Fundamentals for IoT solutions. Extensive hands-on labs and projects gives a depth to the learning experience. This course is a must for Security Professionals, Architects and Technical Decision Makers responsible for digitalization projects of future.   IoT Job Trends Please click on the image to enlarge...Read more


  • Learn various strategies which are part of IoT security planning
  • Learn and explore various new vulnerabilities arising due to IoT and their remediation
  • Perform Threat Modeling for IoT solutions
  • Develop and harden a live IoT solution
  • Perform basic penetration testing on a IoT implementation

Who Should Attend

  • Cyber Security Professionals / Security Analysts looking for enhancing their skills
  • IoT Solutions Architects and Security Architects responsible for building secured IoT solutions
  • Technical Decision Makers who are part of security committee performing security planning


Course Outline

Day 1

  1. Risk Areas in IoT
    • Governance Risks
    • Cyber Security Risks
    • Business Continuity Risks
  2. IoT Security Strategies
    • Risk Assessment
    • Hardware Security
    • SSDLC (Secured Software Development Life Cycle)
    • Operations Life Cycle Management
  3. Device Security
    • Tools and Methods for Device Hacking
    • Secure Reboot
    • Factory Reset
    • Firmware Updates
    • Remote Code Execution
    • Secured Implementation of Cloud Based IoT Hub
    • Monitoring Devices on Cloud

    Hands-On: Hardening IoT Implementation on Cloud and Setting Up Device Monitoring
    Hands-On: Performing Secure Remote Code Execution on IoT Device
    Hands-On: Using Logic Level Analyzer to Attempt Reverse Engineering Attack
    Hands-On: Create a Sensor Network and Perform Attacks on the Target Device like Spoofing the Device, Capturing Authentication and Data

Day 2

  1. Threat Modeling for IoT
    • Core Elements of Threat Model
    • Mapping IoT Attack Vectors
    • Counter Measures
    • Building a Threat Model
    • Top 10 IoT Flaws (OWASP)
  2. Security Planning for IoT Solutions
    • IT Security vs IoT Security
    • International Standards
    • Hardening the OSI Model Features in IoT Stack
  3. Penetration Testing for IoT
    • Pen Testing Methodologies for IoT
    • IoT Pen Testing Stages
    • Tool used in Various Stages

    Hands-On: Scanning and Retrieving RF Signals using RTL-SDR to Attempt Replay Attack

Case Study: MIRAI Attack – IoT
Project: Developing and Hardening IoT Implementation
Project: Penetration Testing on IoT Solution

About The Trainer


Arzan Amaria
Sr. Solutions Architect – Cloud and IoT

Arzan has more than 9 years of experience in Microsoft infrastructure technology stack, Data Science, Cloud and IoT. He has great amount of experience in deploying Cloud based solutions. He is a multi-cloud professional with exposure to Azure, AWS and other IIoT Cloud platforms like GE Predix and IBM Watson.

As a Cloud Solution Architect at CloudThat, he is an expert at deploying, supporting and managing client infrastructures on Azure. Having core training and consulting experience, he specializes in delivering individual training and corporate training on Azure. He is also engaged in extensive research and development in the field of IoT and Data Science and leads a team for the same. He has delivered trainings on IoT and is currently designing Cloud integrated solutions.

He has been training professionals for various Microsoft partners such as Wipro, HPE, HCL, Infosys, Accenture, TCS and many more in the recent past.

He holds following Certifications:

  • GE Predix Certified Developer
  • Microsoft Certified Trainer (MCT)
  • CTT+ (Certified Technical Trainer)
  • MCSD: Azure Solutions Architect
  • MCSE (Server Track)
  • MCTS in Machine Learning
  • VCA-DCV (Data Center Virtualization – Associate)
  • Microsoft Certified Specialist with Hyper – V Virtualization
  • AWS Certified Solutions Architect – Associate Level
  • CEH (Certified Ethical Hacker, EC Council University US)
MCT CompTIA Cloud Essentials Microsoft Certified Solutions Developer
MCSE Microsoft Certified Technology Specialist MCTS vmware certified professional data center virtualization
Microsoft Specialist Server Virtualization with Windows Server AWS Solutions Architect Associate Certified Ethical Hacker

Other Details


For latest batch dates, fees, location and general inquiries, contact our sales team at: +91 8880002200 or

Upcoming Batches


Quick Inquiry: IoT Courses

Recently Viewed Courses.
  • Implementing Cyber Security for IoT

  • Favorite Courses
    No Favourites added yet.

    Our Partners