Об этом курсе
4.4
Оценки: 218
Рецензии: 63
100% онлайн

100% онлайн

Начните сейчас и учитесь по собственному графику.
Гибкие сроки

Гибкие сроки

Назначьте сроки сдачи в соответствии со своим графиком.
Промежуточный уровень

Промежуточный уровень

Часов на завершение

Прибл. 8 часа на выполнение

Предполагаемая нагрузка: 4 weeks of study, 2-3 hours/week...
Доступные языки

Английский

Субтитры: Английский

Приобретаемые навыки

CybersecurityWearable DevicesInternet Of Things (IOT)Wearable Technology
100% онлайн

100% онлайн

Начните сейчас и учитесь по собственному графику.
Гибкие сроки

Гибкие сроки

Назначьте сроки сдачи в соответствии со своим графиком.
Промежуточный уровень

Промежуточный уровень

Часов на завершение

Прибл. 8 часа на выполнение

Предполагаемая нагрузка: 4 weeks of study, 2-3 hours/week...
Доступные языки

Английский

Субтитры: Английский

Программа курса: что вы изучите

Неделя
1
Часов на завершение
2 ч. на завершение

Welcome to Cybersecurity and the Internet of Things!

Welcome to “Cybersecurity and the Internet of Things”! Your team for this course are experts in the field of cybersecurity and the Internet of Things. Through their research and experience, the team has collaborated to create a course that encompasses the most relevant aspects of cybersecurity and its impact on the Internet of Things. The team consists of Dr. Humayun Zafar, Dr. Traci Carte, Mr. Andy Green, and Dr. Herbert Mattord. All team members are faculty at Kennesaw State University which is one of the largest universities in the state of Georgia. In this course, we will talk about the so-called “Internet of Things” and what it means in the industrial sector, the “connected home”, and “consumer wearables” arenas. Good luck, and we look forward to seeing you successfully complete this course! Mr. Green is active on Twitter, follow him at @secprofgreen. He will be tweeting about IoT topics, using the #iotsecmooc tag. Join him there to engage in conversation!...
Reading
4 videos (Total 13 min), 5 материалов для самостоятельного изучения, 1 тест
Video4 видео
How To Succeed In This Course1мин
How Organizations Address IoT1мин
IoT in the Business World4мин
Reading5 материала для самостоятельного изучения
Learning Objectives1мин
What is the Internet of Things?15мин
The Internet of Things – Promise for the Future? An Introduction20мин
Internet of Things to generate 400 zettabytes of data by 201810мин
Internet of Things – New security and privacy challenges20мин
Quiz1 практическое упражнение
Introduction Quiz18мин
Неделя
2
Часов на завершение
3 ч. на завершение

IoT and the Industrial Sector

In this module, you will explore how IoT devices are used in the industrial sector. You will explore some of the common devices in use today, learn how they work, and how businesses and consumers benefit. You will also be exposed to some of the security and privacy-related issues found in this sector....
Reading
5 videos (Total 14 min), 7 материалов для самостоятельного изучения, 2 тестов
Video5 видео
IoT and its Use in Organizations2мин
IoT and Organizational Risks1мин
The Future of Corporate IoT1мин
Industrial Sector and IoT: A Second Look4мин
Reading7 материала для самостоятельного изучения
Learning Objectives10мин
Internet of Things in Industries: A Survey10мин
The Internet of Things in an Enterprise Context10мин
Internet of Things Technology and its Application in Smart Grid10мин
A Survey on Internet of Things: Security and Privacy Issues10мин
Internet of Things in healthcare: Interoperability and security issues10мин
Putting It All Together5мин
Quiz2 практического упражнения
Practice Quiz: IoT and the Industrial Sector Practice20мин
Quiz on IoT and the Industrial Sectorмин
Неделя
3
Часов на завершение
4 ч. на завершение

IoT and the Connected Home

In this module, we will guide you through some of the more common IoT devices in use in a modern “connected home”, and how they are used. We will also show you some of the big security and privacy-related issues found with these devices, and their use in our homes....
Reading
2 videos (Total 8 min), 6 материалов для самостоятельного изучения, 3 тестов
Video2 видео
Your Connected Home5мин
Reading6 материала для самостоятельного изучения
Learning Objectives1мин
Smart Community: An Internet of Things Application15мин
Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications (p. 2347-2360 only)20мин
The Internet of Things: Risks in the Connected Home18мин
How IoT is challenging enterprise security10мин
Putting It All Together10мин
Quiz2 практического упражнения
IoT and the Connected Home Practice Quiz20мин
IoT and the Connected Home20мин
Неделя
4
Часов на завершение
3 ч. на завершение

IoT and Consumer Wearables

In this module, we will expose you to IoT devices in the consumer wearables sector. You will learn about some of the more popular devices, how they are used, what data they can report about you, and how that data may be used. As with the other modules, we will also help you explore current security and privacy-related concerns that are out there. ...
Reading
4 videos (Total 10 min), 7 материалов для самостоятельного изучения, 2 тестов
Video4 видео
Consumer Wearables and the Organizational Risks1мин
Future Opportunities for IoT2мин
IoT and the Cloak of Invisibility3мин
Reading7 материала для самостоятельного изучения
Learning Objectives1мин
Sensor Mania! The Internet of Things, Wearable Computing, Objective Metrics, and the Quantified Self 2.030мин
CES 2016: Fashion meets function in smartwatches, fitness trackers and other wearables10мин
Wearable Technology and the Internet of Things20мин
As IoT risks rise, security vendors won’t meet challenge, says Gartner10мин
Regulating the Internet of Things: First Steps Toward Managing Discrimination, Privacy, Security, and Consent (p. 128-131 only)10мин
Putting It All Together5мин
Quiz2 практического упражнения
IoT and Consumer Wearables Practice Quiz20мин
IoT and Consumer Wearables40мин
4.4
Рецензии: 63Chevron Right
Формирование карьерного пути

33%

начал новую карьеру, пройдя эти курсы
Карьерные преимущества

83%

получил значимые преимущества в карьере благодаря этому курсу

Лучшие рецензии

автор: PKJan 23rd 2017

This module gave me basic understanding on the IoT concepts and the relative security issues associated. It gave me confidence in the field and steps to learning more about this topic.

автор: WVSep 3rd 2016

It is always a good to experience the excellence of the delivery in this course. Great materials with real life experts experience and analysis. Thumbs up.

Преподавателя

Avatar

Dr. Humayun Zafar

Associate Professor of Information Security and Assurance
Information Systems
Avatar

Dr. Traci Carte

Associate Professor Chair, Information Systems
Information Systems
Avatar

Mr. Andy Green

Lecturer of Information Security and Assurance
Kennesaw State University - Department of Information Systems
Avatar

Herbert J. Mattord, Ph.D., CISM, CISSP, CDP

Associate Professor in Information Security and Assurance
Information Systems
Avatar

Michael Whitman, Ph.D., CISM, CISSP

Professor of Information Security
Information Systems

О University System of Georgia

The University System of Georgia is composed of 28 higher education institutions including 4 research universities, 2 regional universities, 12 state universities, 13 state colleges and the Skidaway Institute of Oceanography. The Georgia Public Library System, encompassing 61 library systems throughout Georgia, is also part of the University System....

О специализации ''Cybersecurity: Developing a Program for Your Business'

Cybersecurity is an essential business skill for the evolving workplace. For-profit companies, government agencies, and not-for-profit organizations all need technologically proficient, business-savvy information technology security professionals. In this Specialization, you will learn about a variety of processes for protecting business assets through policy, education and training, and technology best practices. You’ll develop an awareness of the risks and cyber threats or attacks associated with modern information usage, and explore key technical and managerial topics required for a balanced approach to information protection. Topics will include mobility, the Internet of Things, the human factor, governance and management practices....
Cybersecurity: Developing a Program for Your Business

Часто задаваемые вопросы

  • Зарегистрировавшись на сертификацию, вы получите доступ ко всем видео, тестам и заданиям по программированию (если они предусмотрены). Задания по взаимной оценке сокурсниками можно сдавать и проверять только после начала сессии. Если вы проходите курс без оплаты, некоторые задания могут быть недоступны.

  • Записавшись на курс, вы получите доступ ко всем курсам в специализации, а также возможность получить сертификат о его прохождении. После успешного прохождения курса на странице ваших достижений появится электронный сертификат. Оттуда его можно распечатать или прикрепить к профилю LinkedIn. Просто ознакомиться с содержанием курса можно бесплатно.

Остались вопросы? Посетите Центр поддержки учащихся.