Welcome to Cybersecurity and the Internet of Things!-Welcome to Cybersecurity and the Internet of Things!
Welcome to the Internet of Things!
()
How To Succeed In This Course
()
Learning Objectives
What is the Internet of Things?
The Internet of Things – Promise for the Future? An Introduction
Internet of Things to generate 400 zettabytes of data by 2018
Internet of Things – New security and privacy challenges
How Organizations Address IoT
()
IoT in the Business World
()
Get help and meet other learners in this course. Join your discussion forums!
IoT and the Industrial Sector-IoT and the Industrial Sector
Module Overview
()
Learning Objectives
Internet of Things in Industries: A Survey
IoT and its Use in Organizations
()
The Internet of Things in an Enterprise Context
Internet of Things Technology and its Application in Smart Grid
IoT and Organizational Risks
()
A Survey on Internet of Things: Security and Privacy Issues
Internet of Things in healthcare: Interoperability and security issues
The Future of Corporate IoT
()
Industrial Sector and IoT: A Second Look
()
Putting It All Together
IoT and the Connected Home-IoT and the Connected Home
Module overview
()
Learning Objectives
Smart Community: An Internet of Things Application
Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications (p. 2347-2360 only)
The Internet of Things: Risks in the Connected Home
How IoT is challenging enterprise security
Your Connected Home
()
Putting It All Together
IoT and Consumer Wearables-IoT and Consumer Wearables
Module overview
()
Learning Objectives
Sensor Mania! The Internet of Things, Wearable Computing, Objective Metrics, and the Quantified Self 2.0
CES 2016: Fashion meets function in smartwatches, fitness trackers and other wearables
Wearable Technology and the Internet of Things
As IoT risks rise, security vendors won’t meet challenge, says Gartner
Consumer Wearables and the Organizational Risks
()
Regulating the Internet of Things: First Steps Toward Managing Discrimination, Privacy, Security, and Consent (p. 128-131 only)
Future Opportunities for IoT
()
IoT and the Cloak of Invisibility
()
Putting It All Together