Internet of Things (IoT) Security: The Big Picture
Course info



Course info



Description
Internet of Things is everywhere, not just the smart bulbs in your house, we can find IoT in cars, medical devices or public infrastructure in smart cities. In this course, Internet of Things (IoT) Security: The Big Picture, you will learn about the most common security vulnerabilities for IoT solutions and how to address and mitigate them. First, you’ll learn about embedded devices which are the building blocks for IoT solutions and the key differences from traditional IT infrastructure. Next, you’ll learn about the security risks specific to embedded devices and how they get compromised as well as the implications of using development frameworks which don’t have strong support for security. Finally, you’ll learn how to leverage current IT trends such as big data, threat modeling, and secure DevOps to improve security capabilities of internet of things across their lifecycle. When you’re finished with this course, you will have the skills and the knowledge to leverage security standards and frameworks to assess the risk of insecure devices and services and the guidance to develop and improve security capabilities across the landscape.
Section Introduction Transcripts
Course Overview
Hi everyone. My name is Cristian Pascariu, and welcome to my course: Internet of Things Security: The Big Picture. I'm an information security professional, and have dealt with Internet of Things both on the offensive, as well as defensive side. Did you know that these days both nets composed of compromised IoT devices are being used for some of the biggest distributed denial of service attacks, and hackers take advantage of default passwords to compromise internet connected devices in the consumer market, as well as in industrial applications. This course will provide you with a solid foundation for securing the Internet of Things. This is a big picture course, so no prior experience is required. Some of the major topics that we'll cover include: defining IoT, threats and risk factors, security by design, mitigations and security guidance. By the end of this course, you will have a solid foundation to leverage security standards and frameworks to identify and mitigate vulnerabilities across the IoT landscape. From here, you can continue learning by diving into IoT security, with courses on penetration testing, and secure coding. I hope you'll join me on this journey to learn IoT security, with the Internet of Things Security: The Big Picture course, at Pluralsight.