0% found this document useful (0 votes)
77 views2 pages

Syllabus IoT Security

The document outlines the course structure and outcomes for the M. Tech. IoT program, specifically focusing on IoT Security and its corresponding lab course. Students will learn about IoT vulnerabilities, security requirements, and management tools, as well as practical skills in penetration testing, firmware analysis, and radio attacks. The course includes various modules covering topics such as Operational Technology, IoT threats, exploitation tools, and reverse engineering techniques.

Uploaded by

Jaydeo kapale
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
77 views2 pages

Syllabus IoT Security

The document outlines the course structure and outcomes for the M. Tech. IoT program, specifically focusing on IoT Security and its corresponding lab course. Students will learn about IoT vulnerabilities, security requirements, and management tools, as well as practical skills in penetration testing, firmware analysis, and radio attacks. The course includes various modules covering topics such as Operational Technology, IoT threats, exploitation tools, and reverse engineering techniques.

Uploaded by

Jaydeo kapale
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Programme Name M. Tech.

IoT, Semester-II
Course Code
Course Title IoT Security

COURSE OUTCOME

At the end of successful completion of the course, students will be able to:

Comprehend basics of IoT, Industrial IoT and Operational Technology (OT)


vulnerabilities, threats & risks
Realize IoT security requirements and management tools
Comprehend ways to secure IoT

COURSE CONTENTS
Module I Introduction to Operational Technology (OT)
Overview of industrial control systems (ICS), ICS operation & components,
Perdue model, SCADA systems, Cyber-physical systems (CPS) & IoT
Module II IoT Vulnerabilities, Threats & Risks
STRIDE methodology, OWASP Iot vulnerabilities, Privacy & trust,
Insufficient authentication/authorization, Insufficient access control, Attacks
on IoT data, Attacks on IoT layered architecture, Security concerns in IoT
applications, Security concerns in SCADA
Module III IoT Pen testing
Active vulnerability analysis tools, Port scanning, Operating system
fingerprinting and version scanning, Penetration testing, Attack surface
mapping
Module IV Exploitation Tools & Frameworks
Exploitation using I2C & SPI, JTAG debugging and exploitation, Boundary
scan, Test access ports
Module V Firmware Reverse Engineering
Understanding firmware, Extracting firmware, Manual firmware extraction,
Automated file system extraction, Firmware internals, Backdooring a
firmware, Static & dynamic analysis
Module VI Radio & Side Channel Attacks
Software defined radio, Exploiting ZIGBEE & BLE, Power analysis attack,
Invasive attack, Perturbation -attacks, Electromagnetic side channel attack,
fault injection attack, timing attack, covert channel attacks
Text Books:
1.
Elsevier, 2017
2.

3.
Packt Publishing, 2016
Additional Material:
1. Research papers
Programme Name M. Tech. IoT, Semester-II
Course Code
Course Title IoT Security (LAB)

COURSE OUTCOME

At the end of successful completion of the course, students will be able to:

Comprehend basics of IoT, Industrial IoT and Operational Technology (OT)


vulnerabilities, threats & risks
Realize IoT security requirements and management tools
Comprehend ways to secure IoT

COURSE CONTENTS
Module I Introduction to Operational Technology (OT)
Capture and Analyse system network traffic
Module II IoT Vulnerabilities, Threats & Risks
Perform foot printing, information gathering using various foot printing
tools
Module III IoT Pen testing
Use Metasploit framework to exploit SCADA system
Module IV Exploitation Tools & Frameworks
Firmware exploitation using Jtag debugger port
Module V Firmware Reverse Engineering
Static firmware analysis
Module VI Radio & Side Channel Attacks
Dynamic Firmware Analysis; Side channel Attack
Text Books:
1.
Elsevier, 2017
2.

3.
Packt Publishing, 2016
Additional Material:
1. Research papers

You might also like