Promoting Physical Security

Explore the details of protecting local memory and storage, and protecting devices from shell access over a physical port connection.

3 videos  //  17 minutes of training

Course description

You’ve protected the security of your IoT systems through careful design and configuration of your networks, development or selection of secure software, attention to updates and patches, application of secure authentication and authorization, monitoring and numerous other considerations. However, when an attacker gains physical access to devices, many of your protections are rendered moot.

Course syllabus

Protect Local Memory and StorageDuration: 8:53

IoT devices, IoT gateways and other components might be located in remote environments, within public, unsecured spaces or within a private residence. Data within these devices present an attractive target when an attacker has direct, physical access.

Prevent Physical Port AccessDuration: 6:26

Unhindered access to a device's physical ports, particularly when combined with other vulnerabilities, may enable an attacker to perform a variety of attacks. Ports need to be protected logically and physically to ensure they are not used as an attack vector.

CertNexus Certified IoT Security Practitioner Course SummaryDuration: 1:47

Closing comments on this IoT Security course and a summary of points.

Meet the author

Infosec

LinkedIn

Infosec believes knowledge is power when fighting cybercrime. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and privacy training to stay cyber-safe at work and home.

Plans & pricing

Infosec Skills Personal

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

Book a Meeting
  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Award-winning training that you can trust

IDC MarketScape Leader: U.S. IT Training

IDC MarketScape Leader: U.S. IT Training

Infosec Skills

eLearning Content

eLearning Content

Infosec Skills

Best Product - Cybersecurity Training for Infosec Professionals

Best Product - Cybersecurity Training for Infosec Professionals

Infosec Skills

Security Education & Platform

Security Education & Platform

Infosec Skills

Ranked #52 in Top 100 Global Software Sellers

Ranked #52 in Top 100 Global Software Sellers

Infosec