Author
Released
6/16/2017- Reviewing security issues and recent attacks
- Robot security concerns
- IoTSF Compliance Framework
- LoRa security
- Building security into IoT devices
- Moving to trusted execution environments
- Adding sensors and encryption to Marvin
- Generating packets with Paketeer
- The cURL tool
- Testing home IoT devices
Skill Level Intermediate
Duration
Views
- [Instructor] The Internet of Things covers a vast area of automation, from cities and railways to cars and homes, and even to wearable and implanted devices. The two things in common are the use of access networks in the internet to transfer data from machine to machine and very low-cost sensors. The Internet of Things is happening now with new systems and devices being announced almost daily, and with a vast range of sensors available to feed them.
The population of things on the internet has variously been projected at between 80 and 200 billion devices by 2020. This is a revolution in technology, and with it, there's the potential for vastly new and challenging security issues; and we are already starting to see them. I'm Martin Shore, and in my career helping advise on and deliver security for governments and businesses, I've seen many examples of security weaknesses.
In this course, I'll explain how to design IoT devices, the protocols that are used to communicate with IoT devices, and we'll look at some useful tools available to test IoT devices. I'll start by looking at some of major security issues that have been found in IoT systems. These include home automation systems, cars, and drones. I'll explain the current thinking in IoT security and then use a development system called Marvin to look at IoT coding techniques and the LoRa protocol.
We'll then test a number of home automation systems to demonstrate different protocols and approaches to testing. When you finish this course, you'll be well prepared to take your first steps into securing IoT devices. Now let's get started with IoT design and test.
Related Courses
-
Raspberry Pi: Home Monitoring and Control
with David Ross1h 29m Intermediate -
IoT Foundations: Low-Power Wireless Networking
with Ryan Hu2h 32m Intermediate -
Securing the IoT: Introduction
with Lisa Bock1h 41m Beginner
-
Introduction
-
Welcome1m 55s
-
Course disclaimer1m 2s
-
-
1. IoT Security Issues
-
Hacking cars and drones7m 40s
-
2. Designing IoT Security
-
Introducing IoT Security13m 45s
-
LoRa security6m 10s
-
-
3. IoT Development
-
A first look at Marvin5m 30s
-
Adding encryption to Marvin4m 58s
-
Running on the IoT1m 44s
-
-
4. Preparing to Test
-
5. Testing Techniques for Home IoT Devices
-
Advanced testing techniques10m 34s
-
Conclusion
-
What's next1m 12s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Welcome