IOT Security Professional (ICIP)
The program is intended to provide a first hand experience in understanding a cyber attack on IoT and SCADA systems.
It will also provide an insight as to how various IT infrastructures are set up and the possible loopholes or vulnerabilities in each system can be tested.
Learn everything to get started
IOT Security Professional
- What you get
- Who Should Attend
- 30 Days Access to Cyber Range Virtual Labs
- Access to e-learning videos
- Clean Exit Professional Ethics Certification
- Profile in the National Security Database
- Security Researchers
- Students and Professionals keen in Forensics Investigations
- Security Teams
- Law Enforcement Agencies
- Military and police personnel
Rs. 1,20,000 + GST
Rs. 25,000 + GST (only for certification)
IOT Security
Professional
- Availability : Monthly
- Level : 03
The Cyberverse Advantange
30 Days Access to Cyber Range Virtual Labs
Access to e-learning videos
Clean Exit Professional Ethics Certification
Profile in the National Security Database
Live Attacks
Instructor-Support
30 Days Cyber Range Virtual Labs
100% Practical Course
Empanelment at Falcon Level in NSD
Get Recorded Class Lectures
Exam Fee Included
Certificate Included
PROGRAM
Features & Benefits

ISAC ID Card
- Get the exclusive ISAC ID Card
- Enhance your profile credibility globally
- Eligible for NSD Empanelment

30 Days Access to Cyberange Virtual Labs
- Exclusive labs on bug bounty
- Get target and attacker system (kali OS)
- Cloud-based labs with new challenges added every month!
VALUE ADDITION : PROFESSIONAL ETHICS AT WORKPLACE TRAINING AND CERTIFICATION
BROWSE OUR PLANS
Rs. 1,20,000+ GST
Live Instructor Led Sessions, Cyberange virtual lab access, Theory + Lab tests, Certification
Our Batches
07/08/22
07/08/22
Upcoming Events
You will get weekly assignments and research work to enhance your course understanding.Â
Examination
24 Hours Lab Exam under the Information Sharing and Analysis Center
Program Modules
 Introduction
- Cyberange Simulation
- Industrial Sector Digitization
- Security Challenges
Cyber Attack Vectors
- Trojans
- Infection Mechanism
- Trojan Activities
- Defending from trojans
- Social Engg. Attacks
- Spear Phishing
- Impersonation
- DDoS
- Bandwidth Attacks
- Software / Hardware DoS
- Defending DoS Attacks
- Ransomware
- Infection Mechanism
- Ransomware Activities
- Defending ransomware
- Trojans
Scenario: Discovery of Sensitive Devices
- Scanning for Devices
- Weak Authentication
- Attacking and Accessing devices.
Scenario: Network Hacking via IoT
- IoT vulnerabilities
- Prevention Mechanisms
Scenario:Â Hacking Smart Devices
- Smart Device Vulnerabilities
- App Vulnerabilities
- Protecting Data mediums
Scenario: Ransomware attacks
- Propagation and effects
- Preparing for future attacks
Scenario: Turbine Overpowered
- Controlling SCADA Systems
- Overriding Controls
- SCADA Security
Scenario: DoS & DDoS
- DoS on Sensors
- DDoS on Data Acquisition Boards
- Effect of losing Sensor data.
Case Studies
- Wanna Cry Malware
- Crash Override Malware
Defensive Measures
- Threat Intelligence
- Endpoint Protection
- Employee training
- Other Security Softwares
- VAPT
40 Days Access to Cyber Range Virtual Labs
The ISAC Forensic Investigator is a fully hands-on program! You get access to Cyber Range Virtual Labs for 30 days. Gain practical knowledge and fundamental skills with multiple vulnerable applications and Kali OS Distribution on the cloud exclusively for you.
Upcoming Events:
You will get weekly assignments and research work to enhance your course understanding.Â
Who Should Attend
The course is best suited for:
- Security Researchers
- Students and Professionals keen in Forensics Investigations
- Security Teams
- Law Enforcement Agencies
- Military and police personnel
Examination
Get NSD Empanelment Today!
Learn everything to get started Forensics Investigations.
What you get
Get 30 days access to Cyber Range Virtual Labs – Practice with predefined vulnerable Applications and Kali OS Distribution in the cloud, in an exclusive private network only for you!
Get access to course videos on the ISAC e-learning portal, updated regularly!
The program includes Clean Exit Professional Ethics Certification that is mandatory for empanelment in the National Security Database.
Get listed in the National Security Database program at the Falcon level by completing the program.