Cybersecurity and Privacy in the IoT

Iain Murray AM, Nazanin Mohammadi, Eleanor Sandry, CurtinX

Learn about the security and privacy implications of the IoT and how to design a secure system.

As the Internet of Things (IoT) continues to grow so will the number of privacy and security concerns and issues. As a professional working in the field, it is essential to understand the potential security risks and how to best mitigate them.

In this course, you will learn about security and privacy issues in IoT environments. We’ll explore the organizational risks posed by IoT networks, and the principles of IoT device vulnerabilities. We’ll also look at software and hardware IoT Applications for industry.

With billions of devices tracking our every move, privacy is a critical issue. We will explore and discuss the social and commercial implications the IoT brings to society.

What will you learn

  • Identify and analyse IoT security and privacy risks
  • Concept design for secure hardware and software
  • Analyse the social and privacy impacts of the IoT.

Сессии:
  • 5 марта 2019
Характеристики онлайн курса:
  • Бесплатный:
  • Платный:
  • Сертификат:
  • MOOC:
  • Видеолекции:
  • Аудиолекции:
  • Email-курс:
  • Язык: Английский Gb

Отзывы

Пока никто не написал отзыв по этому курсу. Хотите быть первым?

Зарегистрируйтесь, чтобы оставить отзыв

Ещё курсы на эту тему:
51821230-63f3-49bb-86af-0d3073a28648-daa8c635b60b.small Introduction to the Internet of Things (IoT)
Gain an understanding of what the IoT is and the requirements to design your...
Internet Cybersecurity and the Internet of Things
Welcome! You may have heard about the Internet of Things (IoT). But you may...
Internet Cybersecurity and the Internet of Things
Welcome! You may have heard about the Internet of Things (IoT). But you may...
Internet Cybersecurity and the Internet of Things
Welcome! You may have heard about the Internet of Things (IoT). But you may...
Ещё из рубрики «Компьютерные науки»:
Fcd236ea-68ae-46f7-b991-849a41cebc64-c2d3dd18e157.small Video Game Asset Creation and Process
Learn about the tools, processes and platforms that allow video game assets...
511c71b6-c4d1-49af-9301-d8c2012fb289-8ecbefaaca12.small AP Computer Science A: Java Programming Polymorphism and Advanced Data Structures
AP Computer Science A from Purdue University This computer science course covers...
95ed1e7b-ef37-4eb8-aee5-30934fc21318-418d665008f9.small Product Management with Lean, Agile and System Design Thinking
Learn how to plan, develop and deliver on all aspects of work in the lifecycle...
Regular_e0bc186c-7d75-445e-acce-21656f172c47 Introduction to Cyber Security
Our lives depend on online services. Gain essential cyber security knowledge...
Regular_568907d7-0264-4ec0-9b8f-22981fd57db9 Nanotechnology for Health: Innovative Designs for Medical Diagnosis
Discover how nanotechnology can be used for many new opportunities in healthcare...
Ещё от edX:
Bcbbc43f-ba44-4220-950a-3a8fac4dd0f6-2dd0dd280c55.small Managing the Value of Customer Relationships
Learn how to identify your most valuable customers to develop and implement...
Fcd236ea-68ae-46f7-b991-849a41cebc64-c2d3dd18e157.small Video Game Asset Creation and Process
Learn about the tools, processes and platforms that allow video game assets...
291ed465-7c33-4b3d-b8fb-ffd1f12193a6-18c8d4a03ff8.small Marketing Analytics: Data Tools and Techniques
Learn how to measure, manage and analyze customer data to make effective marketing...
006be5f1-6ad8-409e-a4f8-f924e3e7b0a5-3cf7372d3de8.small Selling Ideas: How to Influence Others, and Get Your Message to Catch On
Learn how to use social media and word of mouth to spread your message and grow...
3acfcae0-ed5a-413e-87a0-0c1fd4606b86-a47c511efbce.small Business Strategy from Wharton: Competitive Advantage
Learn how to develop and execute strategies to gain competitive advantage and...

© 2013-2017