Course Series
All About IoT Security
Learn about malware, vulnerabilities, blockchain applications & more to protect connected devices and secure IoT systems.
- 0.6 CEU / 6 PDH credits
- Launched 2023
- 6 courses
- 6 hours
FILTER YOUR RESULTS
Course Series
All About IoT Security
Learn about malware, vulnerabilities, blockchain applications & more to protect connected devices and secure IoT systems.
Individual Course
Digital Privacy: Designing Trustworthy Systems and Technologies
Focus on how to engineer privacy in systems, including principles and design methods, requirement management for control mapping and traceability, system-level data flow, and algorithm design impacts.
Individual Course
Digital Privacy: Implementation and Usability
Make privacy usable for end users. Examine usability challenges, the human-in-the-loop framework, privacy decision-making, the privacy paradox, privacy calculus insights, and potential solutions.
Individual Course
Digital Privacy: Understanding the Operational Framework
Learn to operationalize privacy in an organization. Examine contextual integrity and FAIR/OECD principles, Privacy by Design, the operational lifecycle, impact assessments, and maturity models.
Individual Course
IoT Security: Blockchain Applications
In this course, you’ll review the common challenges in securing IoT devices and the basics of blockchain, then examine the application of blockchain to IoT security.
Individual Course
IoT Security: Botnet Detection
Dive into the world of IoT botnets. Learn how they organize their networks, examine the power-side channel information generated by IoT bots, and explore deep-learning classifier modeling.
Individual Course
IoT Security: Business Case Studies
Taxonomies can help IoT engineers identify vulnerabilities in advance. Explore a proposed taxonomy and learn design best practices gleaned from real-world cyber-attack case studies.
Individual Course
IoT Security: Challenges and Opportunities
Introduce yourself to the world of IoT devices and IoT security, with a particular focus on existing and emerging challenges and opportunities as well as vulnerabilities and cyber-attack motivations.
Individual Course
IoT Security: Directing Network Traffic
Learn to capture, process and analyze IoT network traffic for security purposes. Review undetectable logging, testbed configuration, data capture, feature extraction, and data processing.
Individual Course
IoT Security: Malware Forensics
Get a high-level perspective on IoT malware and malware forensics, then apply that knowledge to real-world malware using the Mirai botnet DDoS attack as a case study.
Course Series
Protecting Privacy in the Digital Age
Safeguard sensitive data in a digitized world through exploring privacy engineering, ethical foundations & emerging challenges.
Individual Course
Digital Privacy: Principles, Regulations, and Ethics
Clarify common privacy misconceptions. Get a privacy taxonomy and focus on the core concepts necessary in organizations, as well as the key regulatory drivers of digital privacy around the globe.
Featured Article