Weekly study6 hours
IoT Security Lab
Can you break into an IoT system?
As threats to IoT systems increase, so does the need to find and fix security vulnerabilities before hackers can exploit them.
In this short course, we introduce a complete IoT ecosystem and examine the role a penetration tester can play in identifying its weaknesses.
During the course, you’ll have the chance to explore the process of an IoT security audit and how to report vulnerabilities to managerial and technical audiences.
- Auditing IoT security
- The Open Web Application Security Project (OWASP) IoT Top 10
- Reporting on IoT vulnerabilities
Learning on this course
You can take this self-guided course and learn at your own pace. On every step of the course you can meet other learners, share your ideas and join in with active discussions in the comments.
What will you achieve?
By the end of the course, you‘ll be able to...
- Assess the security of a complete IoT ecosystem
- Produce a report on IoT security appropriate for both a managerial and technical audience
Who is the course for?
MSc Cyber Security students.
What software or tools do you need?