Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
This specialization is intended for IoT Product Developers, Cybersecurity Professionals, Cloud Service Providers, and Enterprise IT Leaders wanting to expand their knowledge of the fundamentals of Edge Computing, securing IoT and Edge devices, and manage Edge Security. This specialization includes 3 courses: Edge Computing Fundamentals, Implementing Security in IoT and Edge Devices, and Strategic Edge Security Management.
Syllabus
Course 1: Edge Computing Fundamentals
- Offered by LearnQuest. This course is designed for IoT Product Developers, Cybersecurity professionals, and enterprise IT leaders who wish ... Enroll for free.
Course 2: Implementing Security in IoT and Edge Devices
- Offered by LearnQuest. This course is intended for IoT Product Developers and Cybersecurity Professionals. By the end of the course, ... Enroll for free.
Course 3: Strategic Edge Security Management
- Offered by LearnQuest. This course is designed for Enterprise IT Leaders, Cybersecurity Professionals, and Cloud Service Providers. This ... Enroll for free.
- Offered by LearnQuest. This course is designed for IoT Product Developers, Cybersecurity professionals, and enterprise IT leaders who wish ... Enroll for free.
Course 2: Implementing Security in IoT and Edge Devices
- Offered by LearnQuest. This course is intended for IoT Product Developers and Cybersecurity Professionals. By the end of the course, ... Enroll for free.
Course 3: Strategic Edge Security Management
- Offered by LearnQuest. This course is designed for Enterprise IT Leaders, Cybersecurity Professionals, and Cloud Service Providers. This ... Enroll for free.
Courses
-
This course is designed for Enterprise IT Leaders, Cybersecurity Professionals, and Cloud Service Providers. This final course in the series looks at edge security from a strategic perspective. By the end of this course, learners will be able to explain the impact of edge computing breaches, identify edge computing risk identification methodologies, estimate cyber-attack probability with threat data and trends, prioritize potential risks specific to edge computing environments, develop risk mitigation strategies, list real-time monitoring and incident response solutions, list options involved with harmonizing edge computing standards across different regions and industries, and more. Topics for Module 1 will include risk analysis and security risks for edge computing. Module 2 consists of risk prioritization, developing a risk mitigation strategy for edge computing, real-time monitoring, and scalable and adaptive security solutions. During Module 3, you will gain knowledge of compliance with international security standards and ways to stay compliant and updated with changes in edge computing.
-
This course is intended for IoT Product Developers and Cybersecurity Professionals. By the end of the course, learners will be able to explain the security needs of IoT devices and list their security aspects and how to protect them, identify IoT device vulnerabilities and how to develop effective security strategies to safeguard against potential threats, explain the basics of hardware security, list common encryption techniques used in IoT and edge devices, apply security measures to secure IoT and edge device deployments, and more. During Module 1, learners will learn about security challenges and vulnerabilities. Module 2 consists of topics such as hardware security, security-by-design, and best practices for edge computing. Continuing to Module 3, learners will discuss privacy, compliance, and regulatory considerations in edge computing.
-
This course is designed for IoT Product Developers, Cybersecurity professionals, and enterprise IT leaders who wish to understand the technological landscape to ensure their products are secure and fit for their purpose. This course serves as an introduction to the specialization. Upon completion, learners will be able to identify key architectural components of edge computing networks, compare various types of devices and sensors utilized in edge computing, identify challenges associated with edge networks, compare key principles of cybersecurity, identify potential security vulnerabilities in edge networks, list security protocols, explain data privacy and confidentiality, and more. Module 1 includes topics such as the architecture of edge networks, edge computing technologies, devices and sensors, network infrastructure, communication technologies, and more. In Module 2, you will explore the various applications of edge networks such as IoT, Smart Cities, autonomous vehicles, healthcare, industrial automation, and retail and energy management. Module 3 will consist of several topics including common security vulnerabilities as well as the challenges and fundamental concepts in security and privacy.
Taught by
Vahab Iranmanesh