Securing Connected Devices with AWS IoT Device Defender

As the number of AWS IoT devices in your environment grows, it is important to properly monitor and secure them. This course will introduce the AWS Device Defender tool to help you secure your IoT environment.
Course info
Level
Intermediate
Updated
May 27, 2021
Duration
58m
Table of contents
Description
Course info
Level
Intermediate
Updated
May 27, 2021
Duration
58m
Your 10-day individual free trial includes:

Expert-led courses

Keep up with the pace of change with thousands of expert-led, in-depth courses.
Description

Being aware of issues within an environment with many devices can be a challenging task. Internet of Things (IoT) can be especially difficult due to the scale opportunities that exist. AWS has provided a tool called Device Defender to help you stay on top of potential security issues that may exist in your IoT environments. In this course, Securing Connected Devices with AWS IoT Device Defender, you will explore configuring Device Defender to monitor and secure your IoT environment. First, you will learn how to configure and use Device Defender Audit to set up audits to monitor your IoT environments using industry best practice checks. Next, you will discover how to configure and use Device Defender Detect to monitor IoT device metrics to alarm on anomalies. Finally, you will learn how to configure Mitigation Actions to automatically react to a variety of issues that can occur in your environment. When you’re finished with this course, you will have the skills and knowledge to configure Audit, Detect, and Mitigation Actions within AWS IoT Device Defender to monitor and secure your IoT environment.

About the author
About the author

Jason has over 18 years of experience in IT and brings a vast array of experience and love of technology to any challenge or project he is fortunate enough to work on.

Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi everyone. My name is Jason Mitschke, and welcome to my course, Securing Connected Devices with AWS IoT Device Defender. I am a software developer manager and have been in the industry for 18 years. In this course, we are going to provide an overview of both the audit and detect tools within AWS IoT Device Defender. We will explore the various best practice checks used with an audit so you can understand how to set up a proper audit. We will cover the audit findings suppression feature, which can be used to limit audit findings to only those that you care about. We will explore how to set up a security profile and behaviors using device metrics within detect so you can identify any data anomalies that may exist in your IoT environment. We will also explore how to implement mitigation actions to resolve common issues that you may encounter in your environment. Some of the major topics that we will cover include overview and exploration of best practices in the Audit tool, an overview and exploration of security profiles and behaviors in the Detect tool, analysis and remediation of issues that are found using mitigation actions, and CLI commands provided by AWS. By the end of this course, you'll know how to properly configure AWS IoT Device Defender Audit and Detect to monitor the security of your IoT environments. You will also know how to configure mitigation actions to ensure your IoT environment and devices remain safe. Before beginning this course, you should have basic familiarity with AWS IoT services. You should know how to manage the FreeRTOS operating system on your devices, how to implement Greengrass for IoT devices, how to connect simple devices with one click, IoT Analytics, and AWS IoT Core. I hope you'll join me on this journey to learn about Device Defender audit and detect with securing connected devices with AWS IoT Device Defender course, at Pluralsight.