Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Securing IoT systems can be a complicated proposition, involving hazards that many IT workers have never had to deal with. Solutions may involve resource-constrained IoT devices and technologies from many different vendors. IoT devices may be installed in vulnerable locations, and new network devices and protocols add complexity to the overall network architecture.
This Specialization presents an approach for managing the security and data privacy of IoT throughout the entire lifecycle. Through a combination of hands-on activities and case studies, you will learn how to identify and remediate vulnerabilities that undermine IoT security, as well as strategies for managing risk, securing data throughout its entire lifecycle, protecting data privacy, ensuring that IoT resources can be accessed only by authorized users, managing risks related to device firmware and software, and protecting IoT devices from direct physical and network access.
Note: This Specialization requires that you use the provided virtual machines, which include all of the tools and system configurations needed to support the activity environment. The course setup instructions provided in the first course go into more detail about the hardware and software requirements.
Syllabus
- Course 1: IoT Security: Interface and Data Security
- Course 2: IoT Security: Access Control and Network Security
- Course 3: IoT Security: Privacy, Software, and Physical Security
Courses
-
In this course, you'll continue developing your IoT security skills by implementing secure authentication, authorization, and monitoring of IoT systems. You'll also ensure the security of IP networks, wireless networks, mobile networks, and edge networks. This is the second course in a multi-course Specialization. All of the courses in this Specialization require that you use the provided virtual machines, which include all of the necessary tools and system configurations for the activity environment. The course setup instructions provided in the first course go into more detail about the hardware and software requirements.
-
This course will be useful to IoT practitioners who are looking to improve their skills and knowledge of IoT security and privacy. You will begin by mapping the IoT attack surface and building in security by design. Then, you'll identify threats to IoT web and cloud interfaces, and prevent numerous flaws, including injection, session management, cross-site scripting (XSS), and more flaws. You'll also use cryptography appropriately and protect data in motion, at rest, and in use. This is the first course in a multi-course Specialization. All of the courses in this Specialization require that you use the provided virtual machines, which include all of the necessary tools and system configurations for the activity environment. The course setup instructions provided in the first module of this course go into more detail about the hardware and software requirements.
-
To round out your skills in IoT security, you'll protect and dispose of sensitive data when appropriate. You'll also manage risks related to software installations, patches, and operating systems. Lastly, you'll protect local memory and storage, and prevent physical port access. This is the third and final course in a multi-course Specialization. All of the courses in this Specialization require that you use the provided virtual machines, which include all of the necessary tools and system configurations for the activity environment. The course setup instructions provided in the first course go into more detail about the hardware and software requirements.
Taught by
Bill Rosenthal