Center for Qualified CyberSecurity Excellence & Mastery

"Where Qualified Cyber Education Happens"

Q/WNST Qualified/ Wireless Network and IoT Security Testing

Getting wireless certified with Security University shows your Qualified.

The IDC estimates that there would be 152,200 IoT devices connected every minute by 2025, indicating that there would be about 80 billion IoT devices connected annually. While IoT devices have numerous benefits and are immensely helpful for different purposes, they also pose as attractive vulnerabilities for cybercriminals. Be it insecure passwords, networks, ecosystem interfaces or any other vulnerability and weakness, once an IoT device is compromised, it can lead to major losses for any organization, and not just financially.

Class Fee: $3,990
Time:72 hrs
Learning Level: Intermediate
Contact Hours: 51 hr Lecture 21 hr labs
Prerequisites:Understanding of TCP/IP Protocols
Credits: 50 CPE / 3 CEU
Method of Delivery:Residential (100% face-to-face) or Hybrid
Instructor:TBD
Method of Evaluation:95 % attendance 2. 100 % completion of Lab
Grading:Pass = Attendance+ labs & quizzes Fail > 95% Attendance

Sample Job Titles:
Network security engineers
Cybersecurity analysts
Network and security analysts
Full stack engineers
Information system security architects
Network security administrators
Product security analysts
IT security analysts
Security test engineers
Application security testers/analysts
Security delivery analysts, etc.

 

This 72 hour accelerated class is taught using face to face modality or hybrid modality. Class includes 72 hours of contact studies, labs, reading assignments and final exam - passing the final exam is a requirement for graduation.

To the leader in enterprise penetration testing and attack surface management, today announced the launch of its IoT penetration testing services, which will be added to its existing suite of penetration, adversary simulation, and attack surface management capabilities. With the stark growth of IoT adoption over the past few years, pentesting is now a critical asset for companies to understand and assess the overall strength and accountability of their internet-connected systems against sophisticated and targeted cyber attacks.

This class teaches the following capabilities: 

ATM Penetration Testing. Identify the security issues and common vulnerabilities on relevant ATM systems and provide actionable recommendations for improving the overall security posture. Learn more about ATM pentesting.
Automotive Penetration Testing. Identify security issues on relevant vehicles and provide recommendations to improve the current systems – at any stage of automotive development. Learn more about automotive pentesting.
Medical Device Penetration Testing. Through a combination of threat modeling and penetration testing, determine possible medical device security risks and identify whether devices meet or exceed the current standards and recommendations by the FDA Premarket Cybersecurity Guidelines. Learn more about medical device pentesting.
Operational Technology (OT) Architecture and Security Review. Identify industrial control system (ICS) vulnerabilities with a focus on the OT processes in a Defense in Depth strategy. Students will investigate the configuration and architecture of the systems and help address issues with asset inventory, network configuration, and segmentation. Learn more about OT architecture and security review.
Embedded Penetration Testing. Identify embedded system vulnerabilities in a multitiered penetration test across multiple disciplines. Look for security gaps at all stages of embedded development that may affect each layer of the device. Learn more about embedded pentesting.

“IoT has become part of our daily lives, but these devices and systems are often overlooked from a security perspective. Tapping into our innovation-driven culture and our best-in-class technologies. This pentesting testing class is uniquely qualified to find and help fix the most critical security gaps in these systems,” to future-proofing IoT security worldwide.” To keep up with the growth of IoT and assist with the complexity in this space. There is currently a gap in the market to effectively monitor and assess the risks of these devices. This IoT security class also incorporates hands-on practical exercises for a thorough experiential and practical learning experience to the participants.

The course aims to cover the following: 
Red Team Operations & Attack Surface Management
Simulated attacks through a red team engagement enhance your information security program. Red team operations put your organization’s security controls, security policies, incident response, and cybersecurity training to the test. Attack Surface Management detects known, unknown, and potentially vulnerable public-facing assets, as well as changes to your attack surface that may introduce risk. How? Through a combination of powerful Attack Surface Management (ASM) technology platform, penetration testing experts, and 20+ years of pentesting expertise.

This course is highly recommended for system admins and pen testers:
Schedule 2 hr lecture 3 hr labs each day

Grades - All students must ordinarily take all quizzes, labs, final exam and submit the class practical in order to be eligible for a Q/ISP, Q/IAP, Q/SSE, or Q/WP credential unless granted an exception in writing by the President. Know that Q/ISP classes draws quite the spectrum of students, including "those less comfortable," "those more comfortable," and those somewhere in between. However, what ultimately matters in this course is not so much where you end up relative to your classmates but where you end up relative to yourself in on Friday of class. The course is graded as a pass or fail solely on your attendance and participation. Those less comfortable and somewhere in between are not at a disadvantage vis-à-vis those more comfortable. Escalating labs help you prepare for real world scenarios. Each labs escalates upon itself, increasing in intensity, rising to the next level, while you’re mitigating the threat step by step.

Books - No books are required for this course. However, you may want to supplement your preparation for or review of some lectures with self-assigned readings relevant to those lectures' content from either of the books below. The first is intended for those inexperienced in (or less comfortable with the idea of) hacking. The second is intended for those experienced in (or more comfortable with the idea of) hacking. Both are available at sites like Amazon.com. Both are avail at the SU Hacker Library. Realize that free, if not superior, resources can be found on the SU website.