Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

Secure Mobile, IoT & Secure Applications

via Coursera

Overview

Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
This course covers the expanding attack surfaces of embedded systems, IoT devices, mobile platforms, and web applications, all critical areas in security and on the Security+ exam. Covering approximately 3.5 hours of expert instruction, learners develop the skills to secure a wide variety of specialized systems and application-layer communications. Learners benefit by understanding how to secure smartphones, IoT devices, and embedded systems; apply mobile device management (MDM); implement secure application-layer protocols; and identify and mitigate OWASP web application vulnerabilities including SQL injection, cross-site scripting, and CSRF. Online labs reinforce mobile security and application hardening tasks. By the end of this course, learners will be able to protect mobile and specialized systems, implement secure protocols, and defend web applications against common attack patterns.

Syllabus

  • Embedded Systems & IoT Security
    • This chapter introduces embedded platforms, industrial controllers, IoT functions, wireless standards, mobile limitations, device provisioning, infrastructure protection, smartphone hardening, and Zigbee security considerations.
  • Mobile & Dedicated System Security
    • This chapter introduces embedded platforms, industrial controllers, IoT functions, wireless standards, mobile limitations, device provisioning, infrastructure protection, smartphone hardening, and Zigbee security considerations.
  • Web & Protocol Security
    • This chapter reviews DNS usage, protocol security, hardened transfer methods, server protections, session threats, input risks, OWASP guidance, scanning tools, attack identification, and validation practices.
  • Web Application Vulnerabilities
    • This chapter reviews DNS usage, protocol security, hardened transfer methods, server protections, session threats, input risks, OWASP guidance, scanning tools, attack identification, and validation practices.
  • Course Assignment

Taught by

Dan LaChance, Lyndon Williams, and Mike Meyers

Reviews

Start your review of Secure Mobile, IoT & Secure Applications

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.