课程: Securing the IoT: Security Risks

今天就学习课程吧!

今天就开通帐号,24,100 门业界名师课程任您挑!

Next steps

Next steps

- [Narrator] Thank you for watching. In this course, we explored the advantages of the IOT, such as process automation, maintenance forecasting and real-time data insights. Following this, we examine the numerous IOT weaknesses malicious actors can exploit and discussed potential attacks. Finally, we outlined some strategies to safeguard against a cyber attack. If you're interested in learning more about proactively checking an organization's defenses, please check out my course Learning Penetration Testing, and you might want to check out my course, IT Security Foundation's Core Concepts. And you also might want to see what my colleague, Malcolm Shore has for you on his homepage. Keep learning, I hope to see you again soon.

内容