Criteria | ICP 1: Independent Cybersecurity Professional | ICP 2: Enterprise IoT Security & Compliance Teams | IoT Security Students ( University Level Learners & Early Professionals ) |
---|
Age | 20-40 Year Old | 30-50 Year Old | 18-28 Year old |
Demographics | Region: Primary - US, UK, Germany ; Secondary - India | Region: Primary - US, UK , Germany ; Secondary - India | Region: Primary - US, UK , Germany ; Secondary - India |
| Small security consulting firms, IoT security, Bug Bounties | Industries - Automative, industrial IoT, Manufacturing, Smart Devices. | Industries - Cybersecurity, Embedded Systems, IoT Development |
Who are they | Pen-testers, Red Teamers, Bug Bounty Hunters, IoT Security Consultants. | Security Professional working in large enterprises & industrial IoT companies. | University students & fresh graduates in cybersecurity, IoT, and embedded systems |
| Security professionals who need advanced IoT hacking skills for client work & bug bounty programs | Teams responsible for IoT Security assessments, compliance, and vulnerability management. | Early-career professional transitioning into IoT Security |
Why they need EXPLIoT Academy? | IoT security is a niche, high-paying field - learning these skills increase their earning potential. | Their companies design, manufacture, or deploy IoT devices, which are high-risk targets for cyber threats. | Practical IoT security training missing in university courses. |
| More companies demand IoT pentests, and they want to expand their consulting services. | Regulatory compliance (ISO 21434, NIST 800-183, EU, Cyber Resilience Act) requires their team to have IoT security expertise. | Hands-on experience helps them get internships or entry-level jobs. |
| Bug bounty programs are offering rewards for IoT vulher abilities —> learning these skills is financially valuable. | They need structured corporate training for their security engineers & analyst | Prepare them for future certification & professional growth. |
Pain Point | IoT Security training is hard to find —> most available courses are not hands-on | Compliance risk - struggle to meet IoT security compliance standards. | Theoretical university courses don’t provide hands-on hacking practice. |
| Lack of structured labs and real-world scenarios —-> needs interactive practice with real IoT vulnerabilities | Lack of in-house IoT security training - most security teams are general cybersecurity experts, not IoT-specific. | Lack of affordable IoT security courses for students. |
| Stiff competition in bug bounties & consulting —> need advanced skills to stand out | High cost of third-party security assessment - need to upskill internal teams to reduce dependency on external vendors. | Tough job market –> needs extra certification to stand out. |
Behavior | Learns via practical, hands -on training ( HTB, TryHackMe, CTF challenges ) | Learns via structured, corporate training programs | Consume free content first (youtube, free course) before buying paid content |
| Engages in online security communities ( Reddit IoT Security, Discord, Twitter/X) | Engages in IoT security conferences ( DEFCON, IoT Villages, Nullcon, Hardware.io) | Prefer structured certifications to add to resumes |
| Prefer self-paced, in-dept courses | Trends to follow compliance related cybersecurity content (LinkedIn, Industry Report) | Follow security professionals on Twitter/LinkedIn/youtube |
Who takes the decision? | Decision makers - The individual learns | Decision Makers: CISO, Security Manger, Compliance Officer. | Decision maker - The Student or University |
| Decision blockers - High Pricing | Decision Blocker: Budget constraints, internal approval processes for training. | Decision Blocker - High pricing or lack of university endorsement |
Frequency of Use? | Multiple courses per year ( Basis ups killing requirement ) | Quarterly or Annual Team Training Cycles. | Low cost courses at the start, then upgrade to advanced training over time. |
| Hands-on labs used frequently for real-world hacking practices. | New team members need onboarding in IoT security training. | Uses training material for internships & job application. |