Weekly study6 hours
IoT Security Case Studies
Examine real-world threats to the IoT
The number of active IoT devices is growing rapidly, making them attractive targets for cyber attacks.
In October 2016, hackers used tens of thousands of hijacked IoT devices to take a large portion of the internet offline in the US. While it’s thought to be the largest attack of its kind in history, it’s unlikely to be the last.
In this short course, we examine real-world incidents to better understand IoT security threats and the goals of cyber attackers.
- IoT security case studies
- Legal actions and outcomes
- Monetary and reputational costs
Learning on this course
You can take this self-guided course and learn at your own pace. On every step of the course you can meet other learners, share your ideas and join in with active discussions in the comments.
What will you achieve?
By the end of the course, you‘ll be able to...
- Assess previous security failings in IoT
- Evaluate the legal implications of historic IoT security incidents
- Identify potential future incidents given current trends in IoT
Who is the course for?
MSc Cyber Security students.
What software or tools do you need?