Securing the IoT Landscape: From Inception to Architecture
- Offered byCoursera
Securing the IoT Landscape: From Inception to Architecture at Coursera Overview
Duration | 8 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Official Website | Explore Free Course |
Credential | Certificate |
Securing the IoT Landscape: From Inception to Architecture at Coursera Highlights
- Earn a certificate of completion
- Add to your LinkedIn profile
Securing the IoT Landscape: From Inception to Architecture at Coursera Course details
- This comprehensive course is designed for professionals and students seeking a deep understanding of the IoT security landscape. Learners should have a comprehensive understanding of IoT foundations. Participants will cover the Device Identity lifecycle, learn the steps in the Device Bootstrap Process, and explore preventive security measures at the device, network, and cloud levels using real-world examples. The course guides learners through the IoT incident response lifecycle, including the setup of a Security Incident Response Team. It delves into threat modeling, vulnerability management, and penetration testing in the context of IoT security, along with practical insights on tools like Microsoft Defender. The course defines cloud and its characteristics, outlines best practices in cloud deployment architecture, and details strategies for implementing Cloud IAM in IoT ecosystems. The ATASM (Threat Modeling Framework) is applied through a smart city use case, emphasizing the identification and mitigation of potential threats.
Securing the IoT Landscape: From Inception to Architecture at Coursera Curriculum
Welcome & Module 1: Preventive and Defensive Measures to Counter IoT Security Threats
Welcome to the Course
IoT Security Lifecycle and Device Identity Lifecycle
The Device Bootstrap Process
Preventive Security Measures at Device, Network, and Cloud Levels
Introduction to the Connected Vehicle IoT Ecosystem
Security Challenges in the Connected Vehicle Ecosystem
Identity Provisioning and Benefits of Connected Vehicles
Meet your Instructor
Course Syllabus
IOT Device Lifecycle and Management
What is Connected Vehicle Technology and What are the Use Cases?
Lesson 1 Quiz: Lifecycle of IoT Security - Device Identity Lifecycle
Module 1 Exam: Preventive and Defensive Measures to Counter IoT Security Threats
Device Identity lifecycle
Security Challenges
Strategies for Protecting IoT Devices and Networks from Cyber Attacks
The Bootstrapping Process
Connected Vehicles recap
Module 2: Detection, Identification, and Eradication of IoT Security Attacks
Introduction to Strategies for Detecting, Identifying, and Eradicating IoT Security Attacks
Building an IoT Security Incident Response Team
Vulnerability Management, Threat Modeling, and Penetration Testing in IoT Security
Introduction to Microsoft Defender for IoT
Integration of Microsoft Defender for IoT in an IoT Ecosystem
Benefits and Conclusion
Incident Response Team: A Blueprint for Success
Microsoft Defender for IoT/OT environments
Lesson 1 Quiz: Strategies to Detect, Identify, and Eradicate IoT Security Attacks
Lesson 2 Quiz: IoT Security Tool Example
Module 2 Exam: Detection, Identification, and Eradication of IoT Security Attacks
Integration and Proactivity
Microsoft Defender
When to use Microsoft Defender for IoT
Module 3: Cloud Service for IoT Deployment - Secure Deployment and Connection to the Cloud
Introduction to Cloud Services for IoT Deployment
Cloud Service Models and Security Architecture for IoT
Cloud Identity and Access Management (IAM) for IoT
ATASM Threat Modelling Framework
Smart City’s Threat Landscape
Mitigations and Lessons Learned from the Smart City Use Case
Applications of IoT in Smart Cities
Course Conclusion
Lesson 1 Quiz: The Cloud for IoT
Module 3 Exam: Cloud Service for IoT Deployment - Secure Deployment and Connection to the Cloud
Optimizing Cloud IAM
Dalit, the Smart City
Cloud Deployment Models
ATASM and Smart Cities