To round out your skills in IoT security, you'll protect and dispose of sensitive data when appropriate. You'll also manage risks related to software installations, patches, and operating systems. Lastly, you'll protect local memory and storage, and prevent physical port access.

IoT Security: Privacy, Software, and Physical Security

位教师:Bill Rosenthal
访问权限由 Coursera Learning Team 提供
您将学到什么
In this course, you will maintain user privacy, manage software risks, and improve the physical security of IoT systems.
您将获得的技能
- Information Privacy
- Information Systems Security
- Cyber Attacks
- Mobile Security
- Cloud Platforms
- Data Security
- Internet Of Things
- Personally Identifiable Information
- Cloud Security
- General Data Protection Regulation (GDPR)
- Operating Systems
- Hardening
- Release Management
- Network Security
- Patch Management
- Data Storage
- Vulnerability Management
- Application Security
- Cybersecurity
- Cloud Services
- 技能部分已折叠。显示 9 项技能,共 20 项。
要了解的详细信息

添加到您的领英档案
1 项作业
December 2025
了解顶级公司的员工如何掌握热门技能

积累特定领域的专业知识
- 向行业专家学习新概念
- 获得对主题或工具的基础理解
- 通过实践项目培养工作相关技能
- 获得可共享的职业证书

该课程共有4个模块
As an Internet of Things (IoT) Security Practitioner, you should be concerned about data privacy not only from the perspective of protecting users, but also protecting the organizations that you represent. Violations of data privacy can have consequences affecting customers, can harm the organization's reputation, and can put intellectual property or trade secrets at risk. And failure to protect data properly may also have legal consequences to the organizations entrusted with that data.
涵盖的内容
1篇阅读材料5个插件
A wide variety of security issues are caused by flaws in software throughout its entire lifecycle—from development, deployment, and maintenance through its retirement.
涵盖的内容
6个插件
You've protected the security of your IoT systems through careful design and configuration of your networks, development or selection of secure software, attention to updates and patches, application of secure authentication and authorization, monitoring, and numerous other considerations. However, when an attacker gains physical access to devices, many of your protections are rendered moot.
涵盖的内容
4个插件
You'll wrap things up and then validate what you've learned in this course by taking an assessment.
涵盖的内容
1篇阅读材料1个作业1个插件
获得职业证书
将此证书添加到您的 LinkedIn 个人资料、简历或履历中。在社交媒体和绩效考核中分享。
位教师

提供方
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.







