Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
This course will be useful to IoT practitioners who are looking to improve their skills and knowledge of IoT security and privacy. You will begin by mapping the IoT attack surface and building in security by design. Then, you'll identify threats to IoT web and cloud interfaces, and prevent numerous flaws, including injection, session management, cross-site scripting (XSS), and more flaws. You'll also use cryptography appropriately and protect data in motion, at rest, and in use.
This is the first course in a multi-course Specialization.
All of the courses in this Specialization require that you use the provided virtual machines, which include all of the necessary tools and system configurations for the activity environment. The course setup instructions provided in the first module of this course go into more detail about the hardware and software requirements.