- Product security
- ML security
- Data security and E2EE encryption
- Web, API, cloud security
- Linux Hardening / OS Hardening
- Firmware and IoT security
- Diving deeper into IoT security
- IoT Security Labs and Train skills
- IoT Security Books
- NIST SP 800-53: Security and Privacy Controls for Information Systems and Organizations
- NIST SP 800-207: Zero Trust Architecture
- NIST SP 800-161: Cybersecurity Supply Chain Risk Management Practices
- Product development cybersecurity handbook: concepts and considerations for IoT product manufacturers
- Case study: Protecting edge-devices against tampering and reverse engineering
- Blog post: Protecting ML models running on edge devices and mobile apps
- MITRE ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems)
- RFC 9180: Hybrid Public Key Encryption
- Age cryptographic library for file/data encryption on Linux
- Slides: E2EE != security != privacy
- Slides: Data is a new security boundary
- OWASP WSTG: Web Security Testing Guide
- OWASP ASVS: Application Security Verification Standard
- Checklist: CIS Critical Security Controls Cloud Companion Guide
- Blogpost: Raspberry Pi Hardening Guide
- Tool: Lynis - Security auditing tool for Linux
- Tool: SSHesame - SSH Honeypots
- Guide: Awesome security hardening collection
- Guide: Ansible collection of hardening for Linux, SSH, nginx
- Checklist: CIS Benchmarks List
- NIST SP 800-193: Platform Firmware Resiliency
- NIST SP 800-82: Guide to Operational Technology (OT) Security
- NIST SP 800-213: IoT Device Cybersecurity Guidance for the Federal Government
- OWASP FSTM Firmware Security Testing Methodology
- OWASP ISVS IoT Security Verification Standard
- Tool: Firmware Analysis and Comparison Tool
- Checklist: Open-source IoT pentesting framework
- Tool: HAL — The Hardware Analyser
- Guide: Attacks on implementations of secure systems, lectures
- Labs: Damn Vulnerable IoT Device
- Labs: Damn Vulnerable router firmware
- Labs: Damn Vulnerable Raspberry Pi
- Book: The Hardware Hacking Handbook
- Book: Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things
- Book: The IoT Hacker's Handbook
- Book: Hardware Security: A Hands-on Learning Approach
- Book: Inside Radio: An Attack and Defense Guide