CYBER 101

  • Alerts
  • Blog
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Domains
  • FAQ
  • Incidents
  • Tutorials

Subscribe to our newsletter

FOLLOW US

No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Events
  • Jobs
  • Vendors
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
  • Events
  • Jobs
  • Vendors
Get Help
CyberMaterial
Home Education

Cybersecurity and the Internet of Things

by University System of Georgia

Reading Time: 2 mins read
in Course, Education, IoT

Course description

Welcome! You may have heard about the Internet of Things (IoT). But you may also have wondered about what it is. Or for that matter, what does it mean to you or an organization. This course is for you if you are curious about the most recent trends and activities in the internet capabilities and concerns about programmed devices.

There are complexities and areas of necessary awareness when the industrial sector becomes connected to your home. Security policies and practices have not yet caught up to the internet capabilities of some of our most common products. The “connected home”, “consumer wearables”, or even an employee’s HVAC system may cause an unanticipated threat to your business environment.

What you’ll learn

You will explore current security and privacy related concerns in each of these areas. Every module will include readings, videos, case studies, and a quiz to help make sure you understand the material and concepts we talk about.

This course offers a place to learn, reflect, and plan for a smart community approach to IoT. Portions of this course may seem extremely technical in nature. That is because the “things” in IoT represents engineering. Try to grasp the concept in that case.

ENROLL NOW

Tags: CoursesCybersecurity and the Internet of ThingsEducationInternet of thingsIOTIOT CoursesIOT EducationUniversity System of Georgia
ADVERTISEMENT

Related Posts

Biometric Authentication

Biometric Authentication

January 24, 2023
CYBERSECURITY COURSE – Module 7: Biometrics

CYBERSECURITY COURSE – Module 7: Biometrics

January 24, 2023
Non-Profit Security Awareness Training Program

Non-Profit Security Awareness Training Program

January 20, 2023
Cyber Security Education for Non-Profit Organizations

Cyber Security Education for Non-Profit Organizations

January 20, 2023

More Articles

Preventing Digital Extortion: Mitigate ransomware, DDoS, and other cyber-extortion attacks

March 25, 2021
Document

Cloud Security Technical Reference Architecture

March 7, 2022
Incidents

Lazarus APT group targets energy providers

September 9, 2022
Alerts

HPE security advisory (AV22-308)

June 7, 2022
Definition

Adware

January 13, 2021
Alerts

CISA Adds 20 Known Exploited Vulnerabilities

May 24, 2022
Incidents

U.S. Bank data breach impacts 11K customers

November 1, 2022
Book

Federal Cybersecurity: Identification and Mitigation Efforts of Sector-specific Agencies

May 3, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.