This course focuses on topics in architecting and designing a secure Internet of Things (IoT) system, with emphasis on an embedded IoT device and its relationship with the cloud. Topics discussed range from what should be reviewed and defined in the requirements phase to authorization considerations within the IoT device and cloud.
On successful completion of this course, learners should have the knowledge and skills to:
- Authentication to validate the identify of devices and users
- Authorization to ensure users are granted the appropriate level of services
- Physical security to protect connections to IoT devices and to monitor access
- Secure communications between the various IoT system components