CYBERSECURITY FOR THE INTERNET OF THINGS (IOT)

Card image cap
  • DURATION
    6 WEEKS
  • SUBJECT AREA
    IoT
  • COURSE LEVEL
    Second Cycle
  • CREDITS
    3.0 HP
  • INSTITUTION
    REEDEAM
  • STUDY TYPE
    Distance
  • START DATE
    2025-02-03
  • END DATE
    2025-03-15

Applications 2024-09-16 - 2025-01-27

COURSE DESCRIPTION

The Internet of Things (IoT) is a networking paradigm which enables different devices (from thermostats to autonomous vehicles) to collect valuable information and exchange it with other devices using different communications protocols over the Internet. This technology allows to analyse and correlate heterogeneous sources of information, extract valuable insights, and enable better decision processes. Although the IoT has the potential to revolutionise a variety of industries, such as healthcare, agriculture, transportation, and manufacturing, IoT devices also introduce new cybersecurity risks and challenges.

In this course, the students will obtain an in-depth understanding of the Internet of Things (IoT) and the associated cybersecurity challenges. The course covers the fundamentals of IoT and its applications, the communication protocols used in IoT systems, the cybersecurity threats to IoT, and the countermeasures that can be deployed.

The course is split in four main modules, described as follows:

  • Understand and illustrate the basic concepts of the IoT paradigm and its applications
  • Discern benefits and drawback of the most common IoT communication protocols
  • Identify the cybersecurity threats associated with IoT systems
  • Know and select the appropriate cybersecurity countermeasures

Course Plan

Module 1: Introduction to IoT

  • Definition and characteristics of IoT
  • IoT architecture and components
  • Applications of IoT

Module 2: Communication Protocols for IoT

  • Overview of communication protocols used in IoT
  • MQTT, CoAP, and HTTP protocols
  • Advantages and disadvantages of each protocol

Module 3: Security Threats to IoT

  • Overview of cybersecurity threats associated with IoT
  • Understanding the risks associated with IoT
  • Malware, DDoS, and phishing attacks
  • Specific vulnerabilities in IoT devices and networks

Module 4: Securing IoT Devices and Networks

  • Overview of security measures for IoT systems
  • Network segmentation, access control, and encryption
  • Best practices for securing IoT devices and networks

Organisation and Examination

Study hours: 80 hours distributed over 6 weeks

Scehduled online seminars

February 6th 2025, from 13:15 to 16:00

February 26th 2025, from 13:15 to 16:00

March 12th 2025, from 13:15 to 16:00

Examination, one of the following:

  • Analysis and presentation of relevant manuscripts in the literature
  • Bring your own problem (BYOP) and solution. For example, analyse the cybersecurity of the IoT network of your company and propose improvements

The number of participants in the course is limited, so please hurry with your application!

courses you may also like