Remote Access to IoT Devices: Common Needs and Approaches
Offered By: Linux Foundation via YouTube
Course Description
Overview
Explore common needs and approaches for remote access to IoT devices in this informative conference talk by Eystein Måløy Stenberg from Northern.tech Inc. Delve into crucial topics such as risks, audit logs, customer requests, and role-based access control. Learn about various connection methods including outbound connections, terminal access, VPN, reverse SSH, raw socket, and web socket. Discover off-the-shelf solutions and MQTT implementations. Gain insights into other use cases and compare different remote access approaches. Note that the first 10 minutes of the video lack audio due to technical difficulties.
Syllabus
Intro
Risks
Audit logs
Customer requests
Rolebased access control
Summary
Outbound connections
Terminal access
VPN
Reverse SSH
Raw Socket
Web Socket
Offtheshelf solutions
MQTT
Other Use Cases
Off the Shelf Solutions
VPN SSH
WebSocket
WebSocket Terminal
Offtheshelf
Questions
Taught by
Linux Foundation
Tags
Related Courses
Teaching Impacts of Technology: Global SocietyUniversity of California, San Diego via Coursera CCNA Security and CCNP Security Deep Dive Part::1
Udemy The Complete Ethical Hacking Course: Beginner to Advanced!
Udemy The Complete Ethical Hacking Course for 2016/2017!
Udemy Clear and Simple VMware NSX 6.2 and vSphere Virtual Networks
Udemy