From the course: Securing the IoT: Security Risks
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Next steps
From the course: Securing the IoT: Security Risks
Next steps
- [Narrator] Thank you for watching. In this course, we explored the advantages of the IOT, such as process automation, maintenance forecasting and real-time data insights. Following this, we examine the numerous IOT weaknesses malicious actors can exploit and discussed potential attacks. Finally, we outlined some strategies to safeguard against a cyber attack. If you're interested in learning more about proactively checking an organization's defenses, please check out my course Learning Penetration Testing, and you might want to check out my course, IT Security Foundation's Core Concepts. And you also might want to see what my colleague, Malcolm Shore has for you on his homepage. Keep learning, I hope to see you again soon.
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.