Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

Securing the IoT: Privacy

via LinkedIn Learning

Overview

Explore the relationship between security, privacy, and the IoT. Learn about IoT vulnerabilities, privacy concerns, attacks and glitches, and more.

Syllabus

Introduction
  • Securing the IoT
  • What you should know
1. Overview
  • Security, privacy, and IoT
  • Internet of Things
  • Security
  • Privacy
  • Massive adoption
2. Potential Attacks and Glitches
  • Attacks and glitches
  • DDoS
  • Denial-of-sleep attacks
  • IoT worms
  • Voice and sound attacks
3. Vulnerabilities
  • IoT vulnerabilities
  • No malware needed
  • Vendor backdoors
  • Glitches and compatibility issues
  • Army of Things
4. Privacy
  • Privacy concerns
  • Spying
  • Data collection
  • Independent devices
  • Government
  • Challenge: Understanding IoT vulnerabilities
  • Solution: Understanding IoT vulnerabilities
5. Existing Standards and Regulations
  • Standards, regulations, and guidelines
  • PCI DSS
  • HIPAA
  • COBIT
  • Sarbanes-Oxley
6. Proposed Standards and Legislation
  • Need for standards
  • Security legislation
  • Discovering the IoT security foundation
  • Using resources on NIST and OWASP
  • IoT protocols
  • Common IoT language
7. Securing IoT Devices
  • Firewalls and IDS
  • Defending against IoT malware
  • Blockchains and Physical Unclonable Functions (PUF)
  • Education and awareness
Conclusion
  • Next steps

Taught by

Lisa Bock

Reviews

4.5 rating at LinkedIn Learning based on 83 ratings

Start your review of Securing the IoT: Privacy

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.