Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
This course is designed for Enterprise IT Leaders, Cybersecurity Professionals, and Cloud Service Providers. This final course in the series looks at edge security from a strategic perspective. By the end of this course, learners will be able to explain the impact of edge computing breaches, identify edge computing risk identification methodologies, estimate cyber-attack probability with threat data and trends, prioritize potential risks specific to edge computing environments, develop risk mitigation strategies, list real-time monitoring and incident response solutions, list options involved with harmonizing edge computing standards across different regions and industries, and more.
Topics for Module 1 will include risk analysis and security risks for edge computing. Module 2 consists of risk prioritization, developing a risk mitigation strategy for edge computing, real-time monitoring, and scalable and adaptive security solutions. During Module 3, you will gain knowledge of compliance with international security standards and ways to stay compliant and updated with changes in edge computing.