Companies Home Search Profile

Securing the IoT: Security Risks

Focused View

Lisa Bock

1:13:18

63 View
  • 01 - Transforming the world.mp4
    00:48
  • 02 - Discovering resources.mp4
    00:50
  • 01 - Defining the Internet of Things.mp4
    03:03
  • 02 - Transforming business.mp4
    03:01
  • 03 - Moving from SCADA to IIoT.mp4
    03:44
  • 04 - Automating buildings.mp4
    03:04
  • 01 - Exploring OWASP IoT Top 10.mp4
    03:04
  • 02 - Recognizing IoT bugs and compatibility issues.mp4
    03:56
  • 03 - Testing for vulnerabilities.mp4
    04:25
  • 04 - Challenge IoT risks in healthcare.mp4
    01:21
  • 05 - Solution IoT risks in healthcare.mp4
    03:18
  • 01 - Outlining IoT attacks.mp4
    03:23
  • 02 - Attacking insecure IoT devices.mp4
    03:56
  • 03 - Creating an IoT botnet.mp4
    05:08
  • 04 - Denying sleep.mp4
    03:25
  • 05 - Propagating IoT worms.mp4
    03:23
  • 06 - Challenge Enemybot.mp4
    00:54
  • 07 - Solution Enemybot.mp4
    03:12
  • 01 - Ensuring IoT security using AI.mp4
    04:21
  • 02 - Implementing zero trust.mp4
    04:09
  • 03 - Defending against IoT malware.mp4
    04:16
  • 04 - Designing IoT security.mp4
    02:40
  • 05 - Providing education and awareness.mp4
    03:02
  • 01 - Next steps.mp4
    00:55
  • Description


    The Internet of Things (IoT) connects people, infrastructure, and things. Businesses and consumers recognize the value of integrating IoT products and systems into their infrastructure, and manufacturers continue to develop devices to join the Internet of Things. However, many devices are insecure, which can result in an attack with devastating consequences. Malicious actors can leverage IoT vulnerabilities to launch attacks, such as infecting devices with malware, creating an IoT botnet, and denying sleep.

    In this course, security ambassador Lisa Bock covers why it’s essential to consider the many security issues when dealing with the IoT. She then reinforces why testing for vulnerabilities before implementation is critical and describes reasons why it is key for companies to design devices with security in mind. Finally, Lisa reviews some key considerations for selecting and securing your IoT device and outlines ways to deploy effective countermeasures to prevent an attack.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Experienced author with a demonstrated history of working in the e-learning industry. She is a security ambassador with a broad range of IT skills and knowledge, including networking, CyberOps, Wireshark, biometrics, Ethical Hacking and the IoT. Lisa is an author for LinkedIn Learning, Packt Publishing and CompTIA and is an award-winning speaker who has presented at several national conferences. She holds a MS in computer information systems/information assurance from UMGC. Lisa was an associate professor in the IT department at Pennsylvania College of Technology (Williamsport, PA) from 2003 until her retirement in 2020. She is involved with various volunteer activities, and she and her husband Mike enjoy bike riding, watching movies, and traveling.
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 24
    • duration 1:13:18
    • English subtitles has
    • Release Date 2023/07/21