Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

IoT Security: Privacy, Software, and Physical Security

CertNexus via Coursera

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
To round out your skills in IoT security, you'll protect and dispose of sensitive data when appropriate. You'll also manage risks related to software installations, patches, and operating systems. Lastly, you'll protect local memory and storage, and prevent physical port access. This is the third and final course in a multi-course Specialization. All of the courses in this Specialization require that you use the provided virtual machines, which include all of the necessary tools and system configurations for the activity environment. The course setup instructions provided in the first course go into more detail about the hardware and software requirements.

Syllabus

  • Ensuring Privacy
    • As an Internet of Things (IoT) Security Practitioner, you should be concerned about data privacy not only from the perspective of protecting users, but also protecting the organizations that you represent. Violations of data privacy can have consequences affecting customers, can harm the organization's reputation, and can put intellectual property or trade secrets at risk. And failure to protect data properly may also have legal consequences to the organizations entrusted with that data.
  • Managing Software and Firmware Risks
    • A wide variety of security issues are caused by flaws in software throughout its entire lifecycle—from development, deployment, and maintenance through its retirement.
  • Promoting Physical Security
    • You've protected the security of your IoT systems through careful design and configuration of your networks, development or selection of secure software, attention to updates and patches, application of secure authentication and authorization, monitoring, and numerous other considerations. However, when an attacker gains physical access to devices, many of your protections are rendered moot.
  • Completing the Course
    • You'll wrap things up and then validate what you've learned in this course by taking an assessment.

Taught by

Bill Rosenthal

Reviews

Start your review of IoT Security: Privacy, Software, and Physical Security

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.