Securing IoT systems can be a complicated proposition, involving hazards that many IT workers have never had to deal with. Solutions may involve resource-constrained IoT devices and technologies from many different vendors. IoT devices may be installed in vulnerable locations, and new network devices and protocols add complexity to the overall network architecture.
This Specialization presents an approach for managing the security and data privacy of IoT throughout the entire lifecycle. Through a combination of hands-on activities and case studies, you will learn how to identify and remediate vulnerabilities that undermine IoT security, as well as strategies for managing risk, securing data throughout its entire lifecycle, protecting data privacy, ensuring that IoT resources can be accessed only by authorized users, managing risks related to device firmware and software, and protecting IoT devices from direct physical and network access.
Note: This Specialization requires that you use the provided virtual machines, which include all of the tools and system configurations needed to support the activity environment. The course setup instructions provided in the first course go into more detail about the hardware and software requirements.
Applied Learning Project
In each module, you will apply the IoT security skills you learn by simulating attacks on devices and networks, as well as implement protections against those attacks. You'll retain evidence of your security actions within the virtual machines, both of which you can take with you once you've completed each course.















