Play by Play: Emerging Threats in IoT

In this course, you'll learn why devices are being connected, the types of security flaws that are being introduced into them, and - most importantly - how we can better protect them from future malicious attacks.
Course info
Rating
(35)
Level
Beginner
Updated
Oct 12, 2017
Duration
57m
Table of contents
Description
Course info
Rating
(35)
Level
Beginner
Updated
Oct 12, 2017
Duration
57m
Description

Play by Play is a series in which top technologists work through a problem in realtime, unrehearsed and unscripted. In this course, Play by Play: Emerging Threats in IoT, Troy Hunt and Lars Klint define the scope for IoT devices and look at some of the many examples of both humorous and practical implementations. Discover how these devices can influence your everyday and why you, as a developer and general IT professional, should be aware of the capabilities and integration points. By the end of this Play by Play, you'll have learned about multiple different approaches to layer security appropriately, industry patterns and best practices, how to secure your IoT device, and how to fix security vulnerabilities.

About the author
About the author

Lars is an author, trainer, Microsoft MVP, community leader, authority on all things Windows Platform, and part time crocodile wrangler. He is heavily involved in the space of HoloLens and mixed reality, as well as a published Pluralsight author, freelance solution architect, and writer for numerous publications.

More from the author
Managing Scope Creep
Beginner
1h 22m
Jul 5, 2018
Play by Play: Fundamentals of Angular Testing
Intermediate
1h 58m
May 31, 2018
More courses by Lars Klint
About the author

Troy Hunt is a Microsoft Regional Director and MVP for Developer Security. He's a regular conference speaker, frequent blogger at troyhunt.com and is the creator of the data breach notification service known as “Have I Been Pwned”.

More from the author
Ethical Hacking: Social Engineering
Beginner
4h 36m
Sep 13, 2019
More courses by Troy Hunt
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi everyone. I'm Troy Hunt. And I'm Lars Klint. And welcome to our Play by Play on the security of IoT things. I'm an independent security specialist based in Australia, and I've got a passion for security of connected things, whether they be websites, IoT things, or anything else talking over the internet. And I'm a freelance solution architect at larsklint. com, and Microsoft MVP, speaker, and expert in Mixed Reality development, and also Australian Outback internet. I've been building software systems from tiny websites to massive telecommunication systems for the past 20 years. In this course, we're going to look, first of all, at just how far IoT is going. So how much stuff are we connecting to the web, and just what sort of data are we actually collecting? Learn how these devices can influence our every day and why you, as a developer and general IT professional, should be aware of the capabilities and integration points. We'll also look at a lot of IoT security precedence. So we're going to talk about real world examples of where things have gone badly wrong with IoT devices, some of which I've been personally involved in the discovery and reporting of as well. But that is not all. You'll also get firsthand experience on how to secure your IoT devices and fix the security vulnerabilities identified. You'll learn about multiple different approaches to layer security appropriately, as well as industry patterns and best practices. So should devices run as a client, or possibly even as a server, do you actually want to run a web server in your dishwasher and many other such anti-patterns? To complete the course, all you need is an open mind, an understanding of the internet, and the next hour or so to watch this course. I hope you enjoy watching this course and you find it entertaining, insightful, and hopefully enormously useful for how you secure your Internet of Things.