This course will be useful to IoT practitioners who are looking to improve their skills and knowledge of IoT security and privacy. You will begin by mapping the IoT attack surface and building in security by design. Then, you'll identify threats to IoT web and cloud interfaces, and prevent numerous flaws, including injection, session management, cross-site scripting (XSS), and more flaws. You'll also use cryptography appropriately and protect data in motion, at rest, and in use.

IoT Security: Interface and Data Security

IoT Security: Interface and Data Security
This course is part of Internet of Things (IoT) Security (Exam ITS-110) Specialization

Instructor: Bill Rosenthal
Access provided by Seminole State College
What you'll learn
You will use a risk management approach within an IoT system, secure portals used in IoT, and secure data in motion, at rest, and in use.
Skills you'll gain
- Network Security
- Internet Of Things
- Cloud Security
- Secure Coding
- Vulnerability Scanning
- Cloud Services
- Threat Modeling
- Cybersecurity
- Mobile Security
- Data Security
- Application Security
- Security Engineering
- Cyber Risk
- Cyber Attacks
- Infrastructure Security
- Cryptography
- Cloud Platforms
- Vulnerability
- Information Systems Security
- Web Applications
Details to know

Add to your LinkedIn profile
1 assignment
December 2025
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate

There are 4 modules in this course
As an Internet of Things (IoT) Security Practitioner, you are responsible for protecting the security and privacy of organizations and personnel using IoT systems. The size and complexity of this task will be overwhelming unless you have a strategy for breaking it down into solvable problems and deciding which problems must be tackled first. A risk management approach to cybersecurity will help you accomplish this.
What's included
1 reading4 plugins
The Internet of Things (IoT) builds heavily on the technology foundations established by the World Wide Web and cloud computing. IoT depends heavily on web and cloud technologies and is subject to all of the privacy and security threats that accompany those technologies.
What's included
8 plugins
IoT technologies may provide a vast increase in the quality and volume of data available to users and organizations, and with this comes an even greater need to ensure that data is secure when it is stored, processed, and transferred.
What's included
6 plugins
You'll wrap things up and then validate what you've learned in this course by taking an assessment.
What's included
1 reading1 assignment
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor

Offered by
Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.






