IoT device security courses can help you learn about threat modeling, vulnerability assessment, secure coding practices, and encryption techniques. You can build skills in risk management, incident response, and implementing security protocols across various devices. Many courses introduce tools like Wireshark for network analysis, Nessus for vulnerability scanning, and various encryption libraries, showing how these tools can be applied to enhance the security of IoT systems and protect against potential breaches.

Akamai Technologies, Inc.
Skills you'll gain: Endpoint Security, Incident Response, Network Security, Vulnerability Scanning, Computer Security Incident Management, Security Management, Penetration Testing, Cybersecurity, Authentications, Vulnerability Assessments, Encryption, Firewall, Identity and Access Management, Hardening, Threat Detection, Disaster Recovery, Public Key Infrastructure, Mobile Security, Risk Management Framework, Risk Management
Beginner · Course · 1 - 3 Months

Starweaver
Skills you'll gain: Open Web Application Security Project (OWASP), Debugging, DevSecOps, Penetration Testing, Cyber Security Strategy, Security Testing, Application Security, Continuous Monitoring, Software Testing, Development Testing, Cybersecurity, Vulnerability Assessments, Threat Modeling, White-Box Testing, Secure Coding, Vulnerability Management, Technical Communication
Intermediate · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Incident Response, Incident Management, Cyber Governance, Computer Security Incident Management, Security Awareness, Cyber Security Strategy, Law, Regulation, and Compliance, Cyber Attacks, Security Management, Security Strategy, Culture Transformation, Cyber Security Policies, Intrusion Detection and Prevention, Mobile Security, Threat Detection, Disaster Recovery, Cybersecurity, Cyber Risk, Cyber Operations, Cyber Security Assessment
Beginner · Specialization · 3 - 6 Months

Macquarie University
Skills you'll gain: Digital Forensics, Criminal Investigation and Forensics, Investigation, File Systems, Mobile Security, Cybersecurity, Data Security, Data Integrity, Malware Protection, File Management, Computer Security Incident Management, Incident Response, Data Storage, Real Time Data, Disaster Recovery, Linux, Network Analysis, Regulation and Legal Compliance
Beginner · Course · 1 - 3 Months

Skills you'll gain: User Accounts
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Routing Protocols, Network Security, Network Routing, TCP/IP, Open Shortest Path First (OSPF), Network Protocols, Network Switches, Virtual Local Area Network (VLAN), Network Monitoring, Virtual Private Networks (VPN), Firewall, Network Infrastructure, Network Troubleshooting, Border Gateway Protocol, Network Performance Management, Virtual Networking, Network Analysis, Authentications, Encryption
Intermediate · Course · 1 - 3 Months
Starweaver
Skills you'll gain: Medical Privacy, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Incident Response, Security Controls, Computer Security Incident Management, Health Information Management, Data Security, Cyber Risk, Personally Identifiable Information, Regulatory Compliance, Risk Management, Threat Management, Data Management, Threat Modeling, Cybersecurity, ISO/IEC 27001, Compliance Management, Continuous Monitoring
Advanced · Course · 1 - 3 Months

University of California, Irvine
Skills you'll gain: Vendor Management, Security Awareness, Cyber Security Strategy, Risk Management, Threat Management, Security Controls, Human Factors (Security), Asset Protection, Cyber Risk, People Management, Due Diligence
Mixed · Course · 1 - 4 Weeks

Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Cyber Governance, Incident Management, Incident Response, Security Management, Cyber Security Strategy, Cyber Security Policies, Human Factors (Security), Security Awareness, ISO/IEC 27001, Cyber Risk, Security Strategy
Beginner · Course · 1 - 4 Weeks

University of London
Skills you'll gain: Linux, Linux Commands, Computer Systems, Command-Line Interface, Cybersecurity, Computer Architecture, Network Security, Vulnerability Assessments, Hardware Architecture, Application Security, Threat Detection, Authorization (Computing), Network Protocols, Virtual Private Networks (VPN), Operating Systems, Authentications, Network Monitoring, TCP/IP, Network Analysis
Beginner · Course · 1 - 4 Weeks
University of Michigan
Skills you'll gain: Network Security, Network Protocols, Network Architecture, TCP/IP, Web Applications, Computer Networking, Encryption, Network Infrastructure, Innovation, Hypertext Markup Language (HTML)
Beginner · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Windows Servers, Computer Security, Linux Administration, Contingency Planning, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Business Continuity Planning, OSI Models, User Accounts, Group Policy, Security Management, Microsoft Servers, Operating System Administration, Systems Administration, Virtualization, Cybersecurity
Beginner · Specialization · 3 - 6 Months