Companies Home Search Profile

Securing the IoT: Privacy

Focused View

Lisa Bock

1:20:01

87 View
  • 01 - Protecting IoT privacy.mp4
    00:54
  • 02 - Discovering resources.mp4
    00:53
  • 01 - Exploring IoT devices.mp4
    02:33
  • 02 - Leveraging IoT data.mp4
    03:34
  • 03 - Recognizing privacy concerns.mp4
    04:00
  • 04 - Challenge Understanding IoT vulnerabilities.mp4
    01:10
  • 05 - Solution Understanding IoT vulnerabilities.mp4
    03:09
  • 01 - Collecting consumer data.mp4
    04:42
  • 02 - Spying on consumers using the IoT.mp4
    03:21
  • 03 - Eavesdropping and acting independently.mp4
    04:06
  • 04 - Helping government and law enforcement.mp4
    03:01
  • 05 - Converging IoT and AI.mp4
    02:33
  • 01 - Securing card data with PCI DSS.mp4
    03:23
  • 02 - Ensuring privacy with HIPAA.mp4
    02:56
  • 03 - Providing privacy guidelines.mp4
    03:08
  • 04 - Adhering to the COBIT framework.mp4
    03:15
  • 01 - Recognizing the need for standards.mp4
    03:17
  • 02 - Promoting IoT legislation.mp4
    04:43
  • 03 - Using resources on NIST and OWASP.mp4
    03:33
  • 04 - Defining IoT protocols.mp4
    04:13
  • 05 - Creating a common IoT language.mp4
    04:14
  • 01 - Ensuring privacy in the IoT.mp4
    03:03
  • 02 - Securing data using blockchains and PUFs.mp4
    03:10
  • 03 - Keeping smart devices secure.mp4
    03:02
  • 04 - Discovering the IoT Security Foundation.mp4
    03:07
  • 01 - Summary.mp4
    01:01
  • Description


    The Internet of Things (IoT) connects people, infrastructures, and things to improve our lives and enhance production of goods and services. The rapid expansion of IoT technology brings with it an array of exciting and imaginative ways to make our products smarter and our lives easier. But the growth of this emerging technology also brings huge gaps in security. Along with limitless possibilities of the IoT in our business and personal lives, we also need to deal with the growing risks to our privacy.

    In this course, IT security expert Lisa Bock starts by outlining how IoT devices generate immense amounts of data that can pose a risk to our privacy and security. She then explains existing standards and regulations, such as HIPAA and GDPR, that protect privacy and discusses the need to provide standards and legislation to ensure IoT data privacy. Finally, Lisa describes methods to select and secure devices to ensure privacy and security when using an IoT device.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Experienced author with a demonstrated history of working in the e-learning industry. She is a security ambassador with a broad range of IT skills and knowledge, including networking, CyberOps, Wireshark, biometrics, Ethical Hacking and the IoT. Lisa is an author for LinkedIn Learning, Packt Publishing and CompTIA and is an award-winning speaker who has presented at several national conferences. She holds a MS in computer information systems/information assurance from UMGC. Lisa was an associate professor in the IT department at Pennsylvania College of Technology (Williamsport, PA) from 2003 until her retirement in 2020. She is involved with various volunteer activities, and she and her husband Mike enjoy bike riding, watching movies, and traveling.
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 26
    • duration 1:20:01
    • Release Date 2023/10/03