EC04 - IoT Security

Securing connected systems through practical defence, analysis, and real-world attack awareness.

Credits

7.5 ECTS

Semester

1 Semester

Delivery

Online

Duration

13 weeks

Language

English

About This Course

This is a first-semester course in the MBA in Advanced Cybersecurity Technologies &
Governance
IoT Security introduces students to the security challenges of modern Internet of Things systems, combining solid theoretical foundations with hands-on security practice. The course covers IoT architectures, threat modelling, cryptography, secure communication protocols, and web and network security in connected environments. Through practical penetration testing exercises and Capture the Flag challenges, students learn to identify vulnerabilities, exploit them responsibly, and design effective mitigation strategies. The course also engages with current research and real-world attack trends, preparing students to assess and strengthen the security of complex IoT deployments in professional settings.

What You Will Learn


Foundations of IoT Systems and Security

  • Core architectures and components of Internet of Things (IoT) systems
  • Common cybersecurity threats targeting IoT environments
  • Security challenges in large-scale connected device ecosystems


Threat Modelling and Vulnerability Analysis

  • Threat-modelling frameworks such as STRIDE, OCTAVE, and MITRE ATT&CK for IoT/ICS
  • Methods for identifying and analysing vulnerabilities in IoT architectures
  • Risk assessment techniques for connected devices and networks


IoT Cryptography and Secure Communication

  • Cryptographic primitives and key-management mechanisms used in IoT systems

  • Security considerations for IoT communication protocols such as MQTT

  • Defensive approaches for securing IoT networks and applications

Your 13-Week Journey

Here’s how your learning unfolds

Week 1 – IoT Fundamentals

This initial lecture welcomes the students, discusses the courses organization and deadlines, and introduces the students to fundamental IoT systematization and classification.

Week 2 – Threat Modelling

In this lecture, students are introduced to threat modeling and analysis frameworks in the context of IoT.

Week 3 – Threat Analysis and Risk Assessment

This lecture continues the threat modeling discussion by introducing further threat analysis and risk assessment classification schemes.

Week 4 – Cryptographic Primitives 1

This lecture starts the discussion on cryptographic primitives often utilized in classical, as well as edge computing applications.

Week 5 – Cryptographic Primitives 2

This lecture finalizes the discussion on defensive cryptographic primitives by introducing classical asymmetric block and stream ciphers, such as RSA.

Week 6 – Cryptanalysis 1

After having introduced the defensive capabilities of classical cryptographic primitives, students are introduced to offensive cryptanalysis aimed at breaking these classical cryptographic primitives.
In addition to theoretical vulnerabilities, students are introduced to initial examples of real-world IoT vulnerabilities.

Week 7 – Cryptanalysis 2

This lecture continues the cryptanalysis discussion by introducing more well-known attacks on classical stream and block ciphers.

Week 8 – Key Management Protocols

In the scope of this lecture, students are introduced to key negotiation and transport protocols often utilized in IoT devices and edge computing scenarios.
Additionally, students are introduced to typical communication schemes and their implicit security considerations often found in real-world applications.

Week 9 – IoT Communication Patterns

This lecture introduces the students to typical communication patterns often found in real-world IoT applications, including their resulting security considerations.

Week 10 – IoT Web and Network Security

This lecture further analyzes often encountered security considerations when faced with web-enabled IoT devices.

Week 11 – Real-World IoT Attack Methodologies

In this lecture, several real-world examples of attacks on IoT systems and other edge computing systems are discussed and analyzed.

By evaluating the root causes of each attack, lessons-learned are formulated.

Week 12 – Real-World IoT Defensive Methodologies

In this lecture, real-world defense mechanisms intended to protect IoT systems and other edge computing solutions are analyzed.

By analyzing and comparing their defensive capabilities and requirements, best practices are formulated.

Week 13 – Recap and Research Outlook 

This final lecture repeats all covered lecture content and offers students the chance to repeat lecture content in a Q&A session.


Empty space, drag to resize

Skills You Will Gain

IoT Threat Analysis & Penetration Testing

  • Performing threat modelling and risk assessment of IoT architectures
  • Planning and executing penetration testing for IoT devices and networks
  • Identifying vulnerabilities and developing scripts to exploit and test them

Secure IoT Architecture Design

  • Evaluating security mechanisms for IoT communication protocols and infrastructures
  • Designing secure configurations for connected devices and embedded systems
  • Applying secure-by-design principles across the IoT product lifecycle

Cybersecurity Research & Defensive Strategy

  • Monitoring emerging IoT attack trends and security research developments
  • Producing penetration-testing reports and communicating security findings
  • Leading coordinated defensive responses and security improvements in IoT deployments

Week 1 — Systems in Transition

See the world in systems.
Learn to rethink linear vs circular economies and explore planetary boundaries.

Week 2 — The Digital–Circular Nexus

Discover how tech enables sustainability.
Explore how AI, IoT, and data power circular innovation.

Week 3 — Policy as Infrastructure

Understand Europe’s circular blueprint.
Dive into the EU Green Deal, CEAP, and Digital Europe frameworks.

Week 4 — Designing for Re-entry

Design for durability, reuse, and remanufacturing.
Learn how digital twins and simulation tools extend product lifecycles.

Week 5 — Tracking Resources Through Data

Follow materials in motion.
Understand how IoT and data infrastructures create transparency in supply chains.

Week 6 — Blockchain for Accountability

Trust through transparency.
Explore blockchain’s potential for tracking, verification, and ethical assurance.

Week 7 — Learning Loops with AI

Let data drive regeneration.
See how AI and machine learning enable adaptive circular decision-making.

Week 8 — Cognitive Factories

Meet the new industrial symbiosis.
Examine how robotics and smart manufacturing create circular production systems.

Week 9 — Reverse Intelligence

Close the loop through recovery.
Explore reverse logistics, digital disassembly, and resource recovery networks.

Week 10 — Measuring Circularity

Turn data into progress.
Use metrics, KPIs, and dashboards to track circular performance.

Week 11 — Financing the Regenerative Future

Empower innovation.
Discover how deep-tech, investment, and valuation models support circular ventures.

Week 12 — Ethics and Mindsets

Lead with responsibility.
Reflect on ethics, human–machine collaboration, and the competences for circular leadership.

Week 13 — 2040 and Beyond

Imagine the future you want to build.
Learn to rethink linear vs circular economies and explore planetary boundaries.