In this course, you'll learn why devices are being connected, the types of security flaws that are being introduced into them, and - most importantly - how we can better protect them from future malicious attacks.
Play by Play is a series in which top technologists work through a problem in realtime, unrehearsed and unscripted. In this course, Play by Play: Emerging Threats in IoT, Troy Hunt and Lars Klint define the scope for IoT devices and look at some of the many examples of both humorous and practical implementations. Discover how these devices can influence your everyday and why you, as a developer and general IT professional, should be aware of the capabilities and integration points. By the end of this Play by Play, you'll have learned about multiple different approaches to layer security appropriately, industry patterns and best practices, how to secure your IoT device, and how to fix security vulnerabilities.
Lars is an author, trainer, Microsoft MVP, community leader, authority on
all things Windows Platform, and part time crocodile wrangler. He is heavily
involved in the space of HoloLens and mixed reality, as well as a published
Pluralsight author, freelance solution architect, and writer for numerous
Troy Hunt is a Microsoft Regional Director and MVP for Developer Security. He's a regular conference speaker, frequent blogger at troyhunt.com and is the creator of the data breach notification service known as “Have I Been Pwned”.
Course Overview Hi everyone. I'm Troy Hunt. And I'm Lars Klint. And welcome to our Play by Play on the security of IoT things. I'm an independent security specialist based in Australia, and I've got a passion for security of connected things, whether they be websites, IoT things, or anything else talking over the internet. And I'm a freelance solution architect at larsklint. com, and Microsoft MVP, speaker, and expert in Mixed Reality development, and also Australian Outback internet. I've been building software systems from tiny websites to massive telecommunication systems for the past 20 years. In this course, we're going to look, first of all, at just how far IoT is going. So how much stuff are we connecting to the web, and just what sort of data are we actually collecting? Learn how these devices can influence our every day and why you, as a developer and general IT professional, should be aware of the capabilities and integration points. We'll also look at a lot of IoT security precedence. So we're going to talk about real world examples of where things have gone badly wrong with IoT devices, some of which I've been personally involved in the discovery and reporting of as well. But that is not all. You'll also get firsthand experience on how to secure your IoT devices and fix the security vulnerabilities identified. You'll learn about multiple different approaches to layer security appropriately, as well as industry patterns and best practices. So should devices run as a client, or possibly even as a server, do you actually want to run a web server in your dishwasher and many other such anti-patterns? To complete the course, all you need is an open mind, an understanding of the internet, and the next hour or so to watch this course. I hope you enjoy watching this course and you find it entertaining, insightful, and hopefully enormously useful for how you secure your Internet of Things.