-
Course
- Security
Play by Play: Emerging Threats in IoT
In this course, you'll learn why devices are being connected, the types of security flaws that are being introduced into them, and - most importantly - how we can better protect them from future malicious attacks.
What you'll learn
Play by Play is a series in which top technologists work through a problem in realtime, unrehearsed and unscripted. In this course, Play by Play: Emerging Threats in IoT, Troy Hunt and Lars Klint define the scope for IoT devices and look at some of the many examples of both humorous and practical implementations. Discover how these devices can influence your everyday and why you, as a developer and general IT professional, should be aware of the capabilities and integration points. By the end of this Play by Play, you'll have learned about multiple different approaches to layer security appropriately, industry patterns and best practices, how to secure your IoT device, and how to fix security vulnerabilities.
Table of contents
About the authors
Troy Hunt is a Microsoft Regional Director and MVP for Developer Security. He's a regular conference speaker, frequent blogger at troyhunt.com and is the creator of the data breach notification service known as “Have I Been Pwned”.
More Courses by TroyLars is an author, trainer, Microsoft MVP, community leader, authority on all things Windows Platform, and part time crocodile wrangler. He is heavily involved in the space of HoloLens and mixed reality, as well as a published Pluralsight author, freelance solution architect, and writer for numerous publications.
More Courses by Lars