In this video, learn about cameras, watches, fitness devices, glasses, medical sensors, and headsets.
- [Narrator] Wearable technology is any type of smart device…that is implanted in or worn on your body.…These devices take all forms,…including smartwatches, cameras, fitness devices,…glasses, headsets, and medical sensors.…Smartwatches are watches that usually include…a touchscreen interface and a mobile operating system,…like Android or watchOS, on them.…These devices can perform functions…like play music, conduct fitness tracking,…translate languages, provide you directions,…and much, much more.…
Some of these devices require a smartphone to operate,…while others have a built-in cellular data transceiver…to operate independently.…Cameras used to be independent devices as well,…but recently, the introduction of body cameras…for military, police, and security officers…has led to them being placed in the wearable category.…These devices are usually always on,…always recording technology,…and when they run out of storage space,…they simply overwrite the oldest material…stored in their memory.…
Fitness devices are used to track…
Author
Released
8/27/2018- Network and security components
- Security solutions in the architecture
- Securing host devices
- Securing mobile and small form factor devices
- Software vulnerabilities
Skill Level Advanced
Duration
Views
Related Courses
-
CASP+ Cert Prep: 1 Risk Management
with Jason Dion2h 34m Advanced
-
Introduction
-
What you should know1m 25s
-
About the exam1m 48s
-
1. Network and Security Components
-
Network design1m 49s
-
Switches4m 1s
-
Routers1m 41s
-
Proxy2m 3s
-
Firewalls3m 30s
-
Firewall architecture3m 45s
-
Wireless controllers1m 45s
-
Remote access4m 14s
-
Transport encryption3m 28s
-
Mesh networks1m 44s
-
NIDS and NIPS3m 53s
-
SIEM2m 2s
-
Vulnerability scanners2m 1s
-
Database activity monitors2m 11s
-
-
2. Security Solutions in the Architecture
-
ACLs and rule sets2m 18s
-
Change monitoring2m 37s
-
Availability controls5m 22s
-
RAIDS and SANs3m 31s
-
Software-defined networking2m 22s
-
Cloud-managed networks3m 42s
-
Trunking security2m 19s
-
Port security2m 5s
-
Route protection1m 34s
-
DDoS protection2m 45s
-
Security zones4m 2s
-
Network access control2m 43s
-
Network-enabled devices5m 11s
-
Critical infrastructure2m 53s
-
3. Securing Host Devices
-
Securing host devices1m 26s
-
Trusted operating system2m 47s
-
Anti-malware2m 30s
-
Host-based firewall1m 46s
-
HIDS and HIPS59s
-
Data loss prevention2m 16s
-
Log monitoring3m 18s
-
Endpoint detection response1m 18s
-
Patch management2m 12s
-
Baselining configuration1m 36s
-
Group policies2m 23s
-
Command line restrictions1m 48s
-
Restricting peripherals3m 31s
-
Boot loader protections4m 21s
-
Cloud-augmented security2m 50s
-
-
4. Securing Mobile and Small Form Factor Devices
-
BYOD vs. COPE3m 40s
-
Over-the-air updates1m 7s
-
Remote assistance1m 25s
-
Remote access1m 14s
-
Authentication2m 49s
-
Privacy concerns1m 41s
-
Mobile payment1m 58s
-
Tethering1m 33s
-
Wearable technology2m 42s
-
5. Software Vulnerabilities
-
Application specific issues5m 57s
-
Conclusion
-
Next steps2m 17s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Wearable technology