YoVDO

Boot to Cloud Security Considerations for IoT Systems

Offered By: Linux Foundation via YouTube

Tags

IoT security Courses Cryptography Courses Embedded Systems Courses TLS Courses Secure Boot Courses x.509 Certificates Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the challenges and best practices of designing secure IoT systems for resource-constrained embedded devices in this comprehensive conference talk. Delve into end-to-end security considerations, covering secure boot processes, firmware updates, data flow security, and device authentication. Learn about ensuring data trustworthiness, limiting sensitive information visibility, and managing secrets effectively. Discover how to implement reliable device authentication and secure connectivity to cloud servers. Gain insights into the essential skills embedded developers need to navigate the entire boot-to-cloud security landscape. Examine key requirements, design choices, and best practices based on open source software and open standards. Investigate techniques for generating device-bound private keys and UUIDs, implementing mutual TLS, securely encoding and transmitting data, and managing X.509 certificates. Equip yourself with the knowledge to make informed decisions and create minimally secure IoT systems in this informative presentation by Kevin Townsend from Linaro.

Syllabus

Boot to Cloud Security Considerations with IoT - Kevin Townsend, Linaro


Taught by

Linux Foundation

Tags

Related Courses

A developer's guide to the Internet of Things (IoT)
IBM via Coursera
Enterprise and Infrastructure Security
New York University (NYU) via Coursera
Getting Started with the Internet of Things (IoT)
Microsoft via edX
AWS IoT: Developing and Deploying an Internet of Things
Amazon Web Services via edX
Components And Applications Of Internet Of Things
Indian Institute of Technology Patna via Swayam