Coursera
Coursera Logo

Securing the IoT Landscape: From Inception to Architecture 

  • Offered byCoursera

Securing the IoT Landscape: From Inception to Architecture
 at 
Coursera 
Overview

Duration

8 hours

Start from

Start Now

Total fee

Free

Mode of learning

Online

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Securing the IoT Landscape: From Inception to Architecture
 at 
Coursera 
Highlights

  • Earn a certificate of completion
  • Add to your LinkedIn profile
Details Icon

Securing the IoT Landscape: From Inception to Architecture
 at 
Coursera 
Course details

More about this course
  • This comprehensive course is designed for professionals and students seeking a deep understanding of the IoT security landscape. Learners should have a comprehensive understanding of IoT foundations. Participants will cover the Device Identity lifecycle, learn the steps in the Device Bootstrap Process, and explore preventive security measures at the device, network, and cloud levels using real-world examples. The course guides learners through the IoT incident response lifecycle, including the setup of a Security Incident Response Team. It delves into threat modeling, vulnerability management, and penetration testing in the context of IoT security, along with practical insights on tools like Microsoft Defender. The course defines cloud and its characteristics, outlines best practices in cloud deployment architecture, and details strategies for implementing Cloud IAM in IoT ecosystems. The ATASM (Threat Modeling Framework) is applied through a smart city use case, emphasizing the identification and mitigation of potential threats.
Read more

Securing the IoT Landscape: From Inception to Architecture
 at 
Coursera 
Curriculum

Welcome & Module 1: Preventive and Defensive Measures to Counter IoT Security Threats

Welcome to the Course

IoT Security Lifecycle and Device Identity Lifecycle

The Device Bootstrap Process

Preventive Security Measures at Device, Network, and Cloud Levels

Introduction to the Connected Vehicle IoT Ecosystem

Security Challenges in the Connected Vehicle Ecosystem

Identity Provisioning and Benefits of Connected Vehicles

Meet your Instructor

Course Syllabus

IOT Device Lifecycle and Management

What is Connected Vehicle Technology and What are the Use Cases?

Lesson 1 Quiz: Lifecycle of IoT Security - Device Identity Lifecycle

Module 1 Exam: Preventive and Defensive Measures to Counter IoT Security Threats

Device Identity lifecycle

Security Challenges

Strategies for Protecting IoT Devices and Networks from Cyber Attacks

The Bootstrapping Process

Connected Vehicles recap

Module 2: Detection, Identification, and Eradication of IoT Security Attacks

Introduction to Strategies for Detecting, Identifying, and Eradicating IoT Security Attacks

Building an IoT Security Incident Response Team

Vulnerability Management, Threat Modeling, and Penetration Testing in IoT Security

Introduction to Microsoft Defender for IoT

Integration of Microsoft Defender for IoT in an IoT Ecosystem

Benefits and Conclusion

Incident Response Team: A Blueprint for Success

Microsoft Defender for IoT/OT environments

Lesson 1 Quiz: Strategies to Detect, Identify, and Eradicate IoT Security Attacks

Lesson 2 Quiz: IoT Security Tool Example

Module 2 Exam: Detection, Identification, and Eradication of IoT Security Attacks

Integration and Proactivity

Microsoft Defender

When to use Microsoft Defender for IoT

Module 3: Cloud Service for IoT Deployment - Secure Deployment and Connection to the Cloud

Introduction to Cloud Services for IoT Deployment

Cloud Service Models and Security Architecture for IoT

Cloud Identity and Access Management (IAM) for IoT

ATASM Threat Modelling Framework

Smart City’s Threat Landscape

Mitigations and Lessons Learned from the Smart City Use Case

Applications of IoT in Smart Cities

Course Conclusion

Lesson 1 Quiz: The Cloud for IoT

Module 3 Exam: Cloud Service for IoT Deployment - Secure Deployment and Connection to the Cloud

Optimizing Cloud IAM

Dalit, the Smart City

Cloud Deployment Models

ATASM and Smart Cities

Securing the IoT Landscape: From Inception to Architecture
 at 
Coursera 
Admission Process

    Important Dates

    May 25, 2024
    Course Commencement Date

    Other courses offered by Coursera

    – / –
    3 months
    Beginner
    – / –
    20 hours
    Beginner
    – / –
    2 months
    Beginner
    – / –
    3 months
    Beginner
    View Other 6715 CoursesRight Arrow Icon
    qna

    Securing the IoT Landscape: From Inception to Architecture
     at 
    Coursera 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...