• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
Log In
Join for Free
  • Browse
  • Iot Device Security

Iot Device Security Courses

IoT device security courses can help you learn about threat modeling, vulnerability assessment, secure coding practices, and encryption techniques. You can build skills in risk management, incident response, and implementing security protocols across various devices. Many courses introduce tools like Wireshark for network analysis, Nessus for vulnerability scanning, and various encryption libraries, showing how these tools can be applied to enhance the security of IoT systems and protect against potential breaches.


Popular Iot Device Security Courses and Certifications


  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Secure Networked System with Firewall and IDS

    Skills you'll gain: Firewall, Network Security, Intrusion Detection and Prevention, Information Systems Security, Security Controls, Network Monitoring, Threat Detection, Linux Administration, Linux

    4
    Rating, 4 out of 5 stars
    ·
    60 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    Universidad Nacional Autónoma de México

    Relational database systems

    Skills you'll gain: Relational Databases, Database Management, SQL, Databases, Database Design, Database Management Systems, Database Architecture and Administration, Information Systems, MySQL, Query Languages, Data Modeling, Transaction Processing, Information Systems Security, Performance Tuning, Conceptual Design

    4.4
    Rating, 4.4 out of 5 stars
    ·
    458 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of California, Davis

    Secure Coding Practices

    Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Exploit development, Encryption, Penetration Testing, Vulnerability Assessments, Data Security, Application Security, Exploitation techniques, Security Controls, Software Design, Verification And Validation, Java, Code Review, Programming Principles, Debugging, Cybersecurity

    4.5
    Rating, 4.5 out of 5 stars
    ·
    607 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: Preview
    Preview
    S

    Siemens

    Introduction to Model-Based Systems Engineering

    Skills you'll gain: Model Based Systems Engineering, Unified Modeling Language, Systems Engineering, Systems Design, Software Systems, Systems Architecture, Systems Analysis, Product Lifecycle Management, System Requirements, Requirements Analysis, Verification And Validation, Cloud Computing

    4.1
    Rating, 4.1 out of 5 stars
    ·
    70 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Illinois Urbana-Champaign

    Cloud Computing Applications, Part 1: Cloud Systems and Infrastructure

    Skills you'll gain: Cloud Infrastructure, Cloud Services, Cloud Computing, Cloud Storage, Cloud Platforms, Infrastructure As A Service (IaaS), Data Storage, Middleware, Containerization, Virtualization, Virtual Machines, Cloud Applications, Amazon S3, Platform As A Service (PaaS), Scalability

    4.3
    Rating, 4.3 out of 5 stars
    ·
    845 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free
    Free
    C

    Coursera

    Vulnerability Scanning with Nmap: Network Scanning

    Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Cyber Security Assessment, Network Security, Network Monitoring, Network Analysis, Operating Systems

    4.6
    Rating, 4.6 out of 5 stars
    ·
    77 reviews

    Beginner · Guided Project · Less Than 2 Hours

  • Status: Free Trial
    Free Trial
    P

    Packt

    Networking Fundamentals and Protocols

    Skills you'll gain: Networking Hardware, OSI Models, Network Architecture, Network Protocols, Network Security, TCP/IP, Computer Networking, Local Area Networks, Virtual Private Networks (VPN), Wireless Networks, Network Routing, Wide Area Networks, Network Switches, Virtual Local Area Network (VLAN), Firewall

    4.3
    Rating, 4.3 out of 5 stars
    ·
    12 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University at Buffalo

    Digital Thread: Implementation

    Skills you'll gain: Manufacturing Operations, Process Design, Product Design, Manufacturing and Production, Production Process, Digital Transformation, Industrial Engineering, Internet Of Things, Computer-Aided Design, Technology Roadmaps, Enterprise Resource Planning, Technology Strategies, Information Technology, Simulation and Simulation Software, Business Technologies, Cloud Computing

    4.7
    Rating, 4.7 out of 5 stars
    ·
    475 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    M

    Microsoft

    Essentials with Azure Fundamentals

    Skills you'll gain: Microsoft Azure, Cloud Management, Cloud Computing, Cloud Infrastructure, Infrastructure As A Service (IaaS), Cloud Platforms, Infrastructure as Code (IaC), Virtual Machines, System Monitoring, Cloud Security, Scalability

    4.5
    Rating, 4.5 out of 5 stars
    ·
    100 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    CompTIA PenTest+ (PT0-002)

    Skills you'll gain: Penetration Testing, Test Script Development, Brute-force attacks, Cloud Security, Network Analysis, API Testing, General Data Protection Regulation (GDPR), Wireless Networks, Security Controls

    4.7
    Rating, 4.7 out of 5 stars
    ·
    21 reviews

    Intermediate · Specialization · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    Infosec

    Introduction to Python for Cybersecurity

    Skills you'll gain: MITRE ATT&CK Framework, Cybersecurity, Cyber Threat Intelligence, Cyber Operations, IT Automation, Scripting, Python Programming

    4.5
    Rating, 4.5 out of 5 stars
    ·
    427 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of California, Davis

    Exploiting and Securing Vulnerabilities in Java Applications

    Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Java, Java Programming, Dependency Analysis, Docker (Software), JSON, Git (Version Control System)

    4.4
    Rating, 4.4 out of 5 stars
    ·
    66 reviews

    Intermediate · Course · 1 - 4 Weeks

Searches related to iot device security

implementing security in iot and edge devices
1…108109110…278

In summary, here are 10 of our most popular iot device security courses

  • Secure Networked System with Firewall and IDS: University of Colorado System
  • Relational database systems: Universidad Nacional Autónoma de México
  • Secure Coding Practices: University of California, Davis
  • Introduction to Model-Based Systems Engineering: Siemens
  • Cloud Computing Applications, Part 1: Cloud Systems and Infrastructure: University of Illinois Urbana-Champaign
  • Vulnerability Scanning with Nmap: Network Scanning: Coursera
  • Networking Fundamentals and Protocols: Packt
  • Digital Thread: Implementation: University at Buffalo
  • Essentials with Azure Fundamentals: Microsoft
  • CompTIA PenTest+ (PT0-002): Packt

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok