In this course, you'll continue developing your IoT security skills by implementing secure authentication, authorization, and monitoring of IoT systems. You'll also ensure the security of IP networks, wireless networks, mobile networks, and edge networks.

IoT Security: Access Control and Network Security

IoT Security: Access Control and Network Security
This course is part of Internet of Things (IoT) Security (Exam ITS-110) Specialization

Instructor: Bill Rosenthal
Access provided by Xavier School of Management, XLRI
What you'll learn
You will prevent flaws in authentication, authorization, and accounting; and protect various IoT-related networks from unauthorized access.
Skills you'll gain
- Cyber Attacks
- Mobile Security
- Continuous Monitoring
- Network Security
- Cloud Security
- Authorization (Computing)
- General Networking
- Information Systems Security
- Authentications
- Identity and Access Management
- Security Controls
- TCP/IP
- System Monitoring
- Wireless Networks
- Cloud Services
- Cybersecurity
- Application Security
- Cloud Platforms
- Network Monitoring
- Internet Of Things
- Skills section collapsed. Showing 9 of 20 skills.
Details to know

Add to your LinkedIn profile
1 assignment
December 2025
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate

There are 3 modules in this course
The IoT Security Practitioner should aim to ensure that the confidentiality, integrity, and availability of IoT resources are maintained. These goals are largely achieved through the three related concepts of authentication, authorization, and accounting (AAA).
What's included
1 reading6 plugins
IoT makes use of a wide variety of different networking technologies. Some types of networks, such as TCP/IP, Wi-Fi, Bluetooth®, and cellular have been extended to provide support for low-power IoT devices. Other types of networks have been created or adapted specifically to support IoT edge networks. New types of devices, such as IoT gateways, have been added to provide support for the special needs of IoT networking. All of these technologies present an attack surface that the IoT Security Practitioner must consider when protecting IoT systems.
What's included
6 plugins
You'll wrap things up and then validate what you've learned in this course by taking an assessment.
What's included
1 reading1 assignment
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor

Offered by
Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.






