À propos de ce cours
4.4
217 notes
63 avis
100% online

100% online

Commencez dès maintenant et apprenez aux horaires qui vous conviennent.
Dates limites flexibles

Dates limites flexibles

Réinitialisez les dates limites selon votre disponibilité.
Niveau intermédiaire

Niveau intermédiaire

Heures pour terminer

Approx. 8 heures pour terminer

Recommandé : 4 weeks of study, 2-3 hours/week...
Langues disponibles

Anglais

Sous-titres : Anglais...

Compétences que vous acquerrez

CybersecurityWearable DevicesInternet Of Things (IOT)Wearable Technology
100% online

100% online

Commencez dès maintenant et apprenez aux horaires qui vous conviennent.
Dates limites flexibles

Dates limites flexibles

Réinitialisez les dates limites selon votre disponibilité.
Niveau intermédiaire

Niveau intermédiaire

Heures pour terminer

Approx. 8 heures pour terminer

Recommandé : 4 weeks of study, 2-3 hours/week...
Langues disponibles

Anglais

Sous-titres : Anglais...

Programme du cours : ce que vous apprendrez dans ce cours

Semaine
1
Heures pour terminer
2 heures pour terminer

Welcome to Cybersecurity and the Internet of Things!

Welcome to “Cybersecurity and the Internet of Things”! Your team for this course are experts in the field of cybersecurity and the Internet of Things. Through their research and experience, the team has collaborated to create a course that encompasses the most relevant aspects of cybersecurity and its impact on the Internet of Things. The team consists of Dr. Humayun Zafar, Dr. Traci Carte, Mr. Andy Green, and Dr. Herbert Mattord. All team members are faculty at Kennesaw State University which is one of the largest universities in the state of Georgia. In this course, we will talk about the so-called “Internet of Things” and what it means in the industrial sector, the “connected home”, and “consumer wearables” arenas. Good luck, and we look forward to seeing you successfully complete this course! Mr. Green is active on Twitter, follow him at @secprofgreen. He will be tweeting about IoT topics, using the #iotsecmooc tag. Join him there to engage in conversation!...
Reading
4 vidéos (Total 13 min), 5 lectures, 1 quiz
Video4 vidéos
How To Succeed In This Course1 min
How Organizations Address IoT1 min
IoT in the Business World4 min
Reading5 lectures
Learning Objectives1 min
What is the Internet of Things?15 min
The Internet of Things – Promise for the Future? An Introduction20 min
Internet of Things to generate 400 zettabytes of data by 201810 min
Internet of Things – New security and privacy challenges20 min
Quiz1 exercice pour s'entraîner
Introduction Quiz18 min
Semaine
2
Heures pour terminer
3 heures pour terminer

IoT and the Industrial Sector

In this module, you will explore how IoT devices are used in the industrial sector. You will explore some of the common devices in use today, learn how they work, and how businesses and consumers benefit. You will also be exposed to some of the security and privacy-related issues found in this sector....
Reading
5 vidéos (Total 14 min), 7 lectures, 2 quiz
Video5 vidéos
IoT and its Use in Organizations2 min
IoT and Organizational Risks1 min
The Future of Corporate IoT1 min
Industrial Sector and IoT: A Second Look4 min
Reading7 lectures
Learning Objectives10 min
Internet of Things in Industries: A Survey10 min
The Internet of Things in an Enterprise Context10 min
Internet of Things Technology and its Application in Smart Grid10 min
A Survey on Internet of Things: Security and Privacy Issues10 min
Internet of Things in healthcare: Interoperability and security issues10 min
Putting It All Together5 min
Quiz2 exercices pour s'entraîner
Practice Quiz: IoT and the Industrial Sector Practice20 min
Quiz on IoT and the Industrial Sector min
Semaine
3
Heures pour terminer
4 heures pour terminer

IoT and the Connected Home

In this module, we will guide you through some of the more common IoT devices in use in a modern “connected home”, and how they are used. We will also show you some of the big security and privacy-related issues found with these devices, and their use in our homes....
Reading
2 vidéos (Total 8 min), 6 lectures, 3 quiz
Video2 vidéos
Your Connected Home5 min
Reading6 lectures
Learning Objectives1 min
Smart Community: An Internet of Things Application15 min
Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications (p. 2347-2360 only)20 min
The Internet of Things: Risks in the Connected Home18 min
How IoT is challenging enterprise security10 min
Putting It All Together10 min
Quiz2 exercices pour s'entraîner
IoT and the Connected Home Practice Quiz20 min
IoT and the Connected Home20 min
Semaine
4
Heures pour terminer
3 heures pour terminer

IoT and Consumer Wearables

In this module, we will expose you to IoT devices in the consumer wearables sector. You will learn about some of the more popular devices, how they are used, what data they can report about you, and how that data may be used. As with the other modules, we will also help you explore current security and privacy-related concerns that are out there. ...
Reading
4 vidéos (Total 10 min), 7 lectures, 2 quiz
Video4 vidéos
Consumer Wearables and the Organizational Risks1 min
Future Opportunities for IoT2 min
IoT and the Cloak of Invisibility3 min
Reading7 lectures
Learning Objectives1 min
Sensor Mania! The Internet of Things, Wearable Computing, Objective Metrics, and the Quantified Self 2.030 min
CES 2016: Fashion meets function in smartwatches, fitness trackers and other wearables10 min
Wearable Technology and the Internet of Things20 min
As IoT risks rise, security vendors won’t meet challenge, says Gartner10 min
Regulating the Internet of Things: First Steps Toward Managing Discrimination, Privacy, Security, and Consent (p. 128-131 only)10 min
Putting It All Together5 min
Quiz2 exercices pour s'entraîner
IoT and Consumer Wearables Practice Quiz20 min
IoT and Consumer Wearables40 min
4.4
63 avisChevron Right
Orientation de carrière

33%

a commencé une nouvelle carrière après avoir terminé ces cours
Avantage de carrière

83%

a bénéficié d'un avantage concret dans sa carrière grâce à ce cours

Meilleurs avis

par PKJan 23rd 2017

This module gave me basic understanding on the IoT concepts and the relative security issues associated. It gave me confidence in the field and steps to learning more about this topic.

par WVSep 3rd 2016

It is always a good to experience the excellence of the delivery in this course. Great materials with real life experts experience and analysis. Thumbs up.

Enseignants

Avatar

Dr. Humayun Zafar

Associate Professor of Information Security and Assurance
Information Systems
Avatar

Dr. Traci Carte

Associate Professor Chair, Information Systems
Information Systems
Avatar

Mr. Andy Green

Lecturer of Information Security and Assurance
Kennesaw State University - Department of Information Systems
Avatar

Herbert J. Mattord, Ph.D., CISM, CISSP, CDP

Associate Professor in Information Security and Assurance
Information Systems
Avatar

Michael Whitman, Ph.D., CISM, CISSP

Professor of Information Security
Information Systems

À propos de University System of Georgia

The University System of Georgia is composed of 28 higher education institutions including 4 research universities, 2 regional universities, 12 state universities, 13 state colleges and the Skidaway Institute of Oceanography. The Georgia Public Library System, encompassing 61 library systems throughout Georgia, is also part of the University System....

À propos de la Spécialisation Cybersecurity: Developing a Program for Your Business

Cybersecurity is an essential business skill for the evolving workplace. For-profit companies, government agencies, and not-for-profit organizations all need technologically proficient, business-savvy information technology security professionals. In this Specialization, you will learn about a variety of processes for protecting business assets through policy, education and training, and technology best practices. You’ll develop an awareness of the risks and cyber threats or attacks associated with modern information usage, and explore key technical and managerial topics required for a balanced approach to information protection. Topics will include mobility, the Internet of Things, the human factor, governance and management practices....
Cybersecurity: Developing a Program for Your Business

Foire Aux Questions

  • Une fois que vous êtes inscrit(e) pour un Certificat, vous pouvez accéder à toutes les vidéos de cours, et à tous les quiz et exercices de programmation (le cas échéant). Vous pouvez soumettre des devoirs à examiner par vos pairs et en examiner vous-même uniquement après le début de votre session. Si vous préférez explorer le cours sans l'acheter, vous ne serez peut-être pas en mesure d'accéder à certains devoirs.

  • Lorsque vous vous inscrivez au cours, vous bénéficiez d'un accès à tous les cours de la Spécialisation, et vous obtenez un Certificat lorsque vous avez réussi. Votre Certificat électronique est alors ajouté à votre page Accomplissements. À partir de cette page, vous pouvez imprimer votre Certificat ou l'ajouter à votre profil LinkedIn. Si vous souhaitez seulement lire et visualiser le contenu du cours, vous pouvez accéder gratuitement au cours en tant qu'auditeur libre.

D'autres questions ? Visitez le Centre d'Aide pour les Etudiants.