Join Lisa Bock for an in-depth discussion in this video What's next?, part of Securing the IoT: Introduction.
- Thank you for watching. In this course I gave an overview of the Internet of Things and the many different types of devices. I then discussed the internet and various components and the different networks that range in size and purpose, such as LANs, WANs, and PANs. I covered how businesses invest heavily in the IoT in order to keep a competitive edge and include automobiles, medical devices, SCADA, and building automation. I then looked at consumer devices such as wearables, mobile devices, travel, and smart homes.
We saw an evaluation of crossover effects and interactions between the IoT, such as home and health, cars and cities, buildings and energy. I then provided a discussion of IoT resources and protocols, such as Zero Configuration Networking, service discovery, Universal Plug and Play, and Simple Service Discovery Protocol. The course concluded with some thoughts on security, along with an overview of privacy concerns.
I talked about the many products and systems and how manufacturers should design with security in mind. If you're interested in learning more, please check out the IT segment of the lynda.com library, where we add new courses all the time. If you're interested in learning more about packet analysis, please check out my Wireshark course. If you're interested in learning about encryption, please check out my Cryptography course. For security basics check out my Foundations of IT Security.
And, of course, any course in the Ethical Hacking series will be well worth your time. Keep learning. I hope to see you again soon.
Lisa Bock kicks off the course with an overview of IoT, and the types of IoT devices designed to improve the quality of life in homes and businesses. Lisa covers different networks that range in size and purpose—LANS, WANS and PANS—and explains how businesses invest heavily in IoT in order to keep a competitive edge, going into IoT developments in automobiles, building automation, and the medical field. She then evaluates consumer devices, such as wearables and mobile devices. Plus, she discusses zero-configuration networking, service discovery, designing IoT security, and more.
- A history of the Internet of Things
- How sensor nodes collect and communicate information
- Data management and process management
- Networking the IoT
- How IoT is transforming and improving businesses
- How IoT is a natural extension and evolution of SCADA
- How IoT affects mobile devices, smart homes, and travel
- Zero-configuration networking
- Testing for vulnerabilities before implementation
- Designing IoT security