Course Description
The Internet of Things (IoT) enables data to be collected and analyzed on a massive scale, enabling well-informed decisions to be made quickly. However, the deluge of data handled by IoT systems is often acquired, processed, and presented using new technologies that are rapidly evolving and in some cases being rushed to market, creating new concerns for data privacy and cybersecurity.
Certified Internet of Things (IoT) Security Practitioner Dec 2025Certified Internet of Things (IoT) Security Practitioner
Topic A: Map the IoT Attack Surface
Topic B: Build in Security by Design
Lesson 2: Securing Web and Cloud InterfacesTopic A: Identify Threats to IoT Web and Cloud InterfacesTopic B: Prevent Injection FlawsTopic C: Prevent Session Management FlawsTopic D: Prevent Cross-Site Scripting FlawsTopic E: Prevent Cross-Site Request Forgery FlawsTopic F: Prevent Unvalidated Redirects and Forwards
Topic A: Identify Threats to IoT Web and Cloud Interfaces
Topic B: Prevent Injection Flaws
Topic C: Prevent Session Management Flaws
Topic D: Prevent Cross-Site Scripting Flaws
Topic E: Prevent Cross-Site Request Forgery Flaws
Topic F: Prevent Unvalidated Redirects and Forwards
Lesson 3: Securing DataTopic A: Use Cryptography AppropriatelyTopic B: Protect Data in MotionTopic C: Protect Data at RestTopic D: Protect Data in Use
Topic A: Use Cryptography Appropriately
Topic B: Protect Data in Motion
Topic C: Protect Data at Rest
Topic D: Protect Data in Use
Lesson 4: Controlling Access to IoT ResourcesTopic A: Identify the Need to Protect IoT ResourcesTopic B: Implement Secure AuthenticationTopic C: Implement Secure AuthorizationTopic D: Implement Security Monitoring on IoT Systems
Topic A: Identify the Need to Protect IoT Resources
Topic B: Implement Secure Authentication
Topic C: Implement Secure Authorization
Topic D: Implement Security Monitoring on IoT Systems
Lesson 5: Securing IoT NetworksTopic A: Ensure the Security of IP NetworksTopic B: Ensure the Security of Wireless NetworksTopic C: Ensure the Security of Mobile NetworksTopic D: Ensure the Security of IoT Edge Networks
Topic A: Ensure the Security of IP Networks
Topic B: Ensure the Security of Wireless Networks
Topic C: Ensure the Security of Mobile Networks
Topic D: Ensure the Security of IoT Edge Networks
Lesson 6: Ensuring PrivacyTopic A: Improve Data Collection to Reduce Privacy ConcernsTopic B: Protect Sensitive DataTopic C: Dispose of Sensitive Data
Topic A: Improve Data Collection to Reduce Privacy Concerns
Topic B: Protect Sensitive Data
Topic C: Dispose of Sensitive Data
Lesson 7: Managing Software and Firmware RisksTopic A: Manage General Software RisksTopic B: Manage Risks Related to Software Installation and ConfigurationTopic C: Manage Risks Related to Software Patches and UpdatesTopic D: Manage Risks Related to IoT Device Operating Systems and Firmware
Topic A: Manage General Software Risks
Topic B: Manage Risks Related to Software Installation and Configuration
Topic C: Manage Risks Related to Software Patches and Updates
Topic D: Manage Risks Related to IoT Device Operating Systems and Firmware
Lesson 8: Promoting Physical SecurityTopic A: Protect Local Memory and StorageTopic B: Prevent Physical Port Access
Topic A: Protect Local Memory and Storage
Topic B: Prevent Physical Port Access
Related Certificates
Earning a Saint Louis University Workforce Center certificate allows you to enhance your career options by networking with peers and establishing valuable industry contacts.
ISACA Professional Certificate
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud.
See Details
Artificial Intelligence and Large Language Models Foundations
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud.
See Details
Artificial Intelligence and Machine Learning for Cybersecurity Operations
Artificial intelligence (AI) and machine learning (ML) are revolutionizing the cybersecurity industry. The emergence of ML as a tool for...
See Details