Learn about securing the Internet of Things. Explore the types of IoT devices designed to improve the quality of life in homes and businesses, discover how to design IoT security, and more.
- [Lisa] In 1999, Kevin Ashton coined the phrase the Internet of Things. Which represents the concept of a massive system, where things on the Internet communicate through omni-present sensors. Since then, consumers have connected smart devices to the network at an expidential rate. By 2020, Industry estimates seven devices per person.
Which means, a future where many everyday things all interconnect. With a goal of improving overall quality of life. Hello, my name is Lisa Bock. In this course, I'll cover the Internet of Things. I'll begin with an overview, and review the many different types of devices. You'll learn how businesses invest heavily in the Internet of Things in order to keep a competitive edge.
And things such as automobiles, medical devices, SCADA, and building automation. The course then evaluates consumer devices. Such as wearables, mobile devices, and smart homes. An evaluation of crossover effects and interaction between Internet of Things, such as home and health, cars and cities, buildings and energy. I'll provide a discussion of IoT resources and protocols.
Such as Zero Configuration Networking, Service Discovery, Universal Plug and Play, and Simple Service Discovery Protocol. The course concludes with some thoughts on security. I'll provide an overview of privacy concerns. I'll talk about the many products and systems, and how manufactures should design with security in mind. Are you ready? Let's get started.
Lisa Bock kicks off the course with an overview of IoT, and the types of IoT devices designed to improve the quality of life in homes and businesses. Lisa covers different networks that range in size and purpose—LANS, WANS and PANS—and explains how businesses invest heavily in IoT in order to keep a competitive edge, going into IoT developments in automobiles, building automation, and the medical field. She then evaluates consumer devices, such as wearables and mobile devices. Plus, she discusses zero-configuration networking, service discovery, designing IoT security, and more.
- A history of the Internet of Things
- How sensor nodes collect and communicate information
- Data management and process management
- Networking the IoT
- How IoT is transforming and improving businesses
- How IoT is a natural extension and evolution of SCADA
- How IoT affects mobile devices, smart homes, and travel
- Zero-configuration networking
- Testing for vulnerabilities before implementation
- Designing IoT security