Lesson 1: Managing IoT Risks
Lesson 2: Securing Web and Cloud Interfaces
Lesson 3: Securing Data
Lesson 4: Controlling Access to IoT Resources
Lesson 5: Securing IoT Networks
Lesson 6: Ensuring Privacy
Lesson 7: Managing Software and Firmware Risks
Lesson 8: Promoting Physical Security
To ensure your success in this course you should have a fundamental understanding of IoT ecosystems, which you can obtain by taking the following CertNexus course:
Share course with your friends
Cookies and similar technologies are used on our sites to personalize content and ads. You can find further details and change your personal settings below. By clicking OK, or by clicking any content on our sites, you agree to the use of these cookies and similar technologies.
When you visit any of our websites, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and manage your preferences. Please note, that blocking some types of cookies may impact your experience of the site and the services we are able to offer.