YoVDO

Wireless Sensors' Power Consumption and IoT Security

Offered By: RSA Conference via YouTube

Tags

RSA Conference Courses Deep Learning Courses IoT security Courses Threat Detection Courses

Course Description

Overview

Explore the critical intersection of wireless sensor power consumption and IoT security in this 47-minute conference talk from the RSA Conference. Delve into the concept of using suspicious sensor behavior and hyperactivity as key indicators for threat detection in distributed environments. Learn from experts Mohamed Sohail, a Data Protection and Availability Expert and IoT Researcher at Dell-EMC Corporation, and Dr. Said Tabet, Sr. Consultant, Technologist, and CTO Standards at EMC Corporation. Gain insights into IoT security challenges, assessment techniques, and innovative solutions such as power behavioral profiling. Discover how deep learning and CPI (Cycles Per Instruction) analysis contribute to a new security paradigm for IoT ecosystems. Engage with topics including latency considerations and participate in a Q&A session to further your understanding of this crucial aspect of modern cybersecurity.

Syllabus

Introduction
IoT Security
IoT Security Challenges
IoT Security Assessment
Solution Overview
Power Behavioral Profiling
New Security Paradigm
Power Profiling
Deep Learning
CPI
Questions
Latency


Taught by

RSA Conference

Related Courses

A developer's guide to the Internet of Things (IoT)
IBM via Coursera
Enterprise and Infrastructure Security
New York University (NYU) via Coursera
Getting Started with the Internet of Things (IoT)
Microsoft via edX
AWS IoT: Developing and Deploying an Internet of Things
Amazon Web Services via edX
Components And Applications Of Internet Of Things
Indian Institute of Technology Patna via Swayam