Reducing Exploitation Risk via Application-Specific Hardening in IoT Systems

Reducing Exploitation Risk via Application-Specific Hardening in IoT Systems

Linux Foundation via YouTube Direct link

APPLICATION HARDENING: CONCLUSION

12 of 13

12 of 13

APPLICATION HARDENING: CONCLUSION

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Reducing Exploitation Risk via Application-Specific Hardening in IoT Systems

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 SYSTEM SECURITY ASPECTS
  3. 3 Secure System Architecture
  4. 4 Security-by-Design SW Components
  5. 5 Secure Software? Not in general!
  6. 6 APPLICATION HARDENING: LINUX SECURITY FEATURES
  7. 7 Application Hardening Linux Security Features
  8. 8 APPLICATION HARDENING: HANDS-ON
  9. 9 Hands-On: Security Features
  10. 10 Application Hardening Hands-On: Connman
  11. 11 Hands-On: Bluetooth tethering - Connman & BlueZ
  12. 12 APPLICATION HARDENING: CONCLUSION
  13. 13 Application Hardening Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.