YoVDO

Remote Access to IoT Devices: Common Needs and Approaches

Offered By: Linux Foundation via YouTube

Tags

Microsoft Access Courses Network Security Courses MQTT Courses VPN Courses Role-Based Access Control Courses SSH Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore common needs and approaches for remote access to IoT devices in this informative conference talk by Eystein Måløy Stenberg from Northern.tech Inc. Delve into crucial topics such as risks, audit logs, customer requests, and role-based access control. Learn about various connection methods including outbound connections, terminal access, VPN, reverse SSH, raw socket, and web socket. Discover off-the-shelf solutions and MQTT implementations. Gain insights into other use cases and compare different remote access approaches. Note that the first 10 minutes of the video lack audio due to technical difficulties.

Syllabus

Intro
Risks
Audit logs
Customer requests
Rolebased access control
Summary
Outbound connections
Terminal access
VPN
Reverse SSH
Raw Socket
Web Socket
Offtheshelf solutions
MQTT
Other Use Cases
Off the Shelf Solutions
VPN SSH
WebSocket
WebSocket Terminal
Offtheshelf
Questions


Taught by

Linux Foundation

Tags

Related Courses

Teaching Impacts of Technology: Global Society
University of California, San Diego via Coursera
CCNA Security and CCNP Security Deep Dive Part::1
Udemy
The Complete Ethical Hacking Course: Beginner to Advanced!
Udemy
The Complete Ethical Hacking Course for 2016/2017!
Udemy
Clear and Simple VMware NSX 6.2 and vSphere Virtual Networks
Udemy