Industrial IoT Markets and Security

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Industrial IoT Markets and Security

Coursera · Beginner ·🔐 Cybersecurity ·1mo ago
In Industrial IoT Markets and Security, students will learn about markets (Transportation, Agriculture and more), platforms (IBM Watson Cloud services for example), software and services, networking basics, wireless communications protocols and a thorough introduction to computer security. Developing tomorrow's industrial infrastructure is a significant challenge. This course goes beyond the hype of consumer IoT to emphasize broader application areas such as Advanced Manufacturing and Building Automation. The Industrial Internet of Things (IIoT), is also known as Industry 4.0. Cisco’s CEO stated: “IoT overall is a $19 Trillion market. IIoT is a significant subset including digital oilfield, advanced manufacturing, power grid automation, and smart cities”. This is part 1 of the specialization. The primary objective of this specialization is to closely examine emerging markets, technology trends, applications and skills required by engineering students, or working engineers, exploring career opportunities in the IIoT space. The structure of the course is intentionally wide and shallow: We will cover many topics, but will not go extremely deep into any one topic area, thereby providing a broad overview of the immense landscape of IIoT. There is one exception: We will study security in some depth as this is the most important topic for all "Internet of Things" product development. In this course students will learn : * What Industry 4.0 is and what factors have enabled the IIoT. * Key skills to develop to be employed in the IIoT space. * What platforms are, and also market information on Software and Services. * What the top application areas are (examples include Manufacturing and Oil & Gas). * What the top operating systems are that are used in IIoT deployments. * About networking and wireless communication protocols used in IIoT deployments. * About computer security; encryption techniques and secure methods for insuring data integrity and authent
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Stop Storing JWTs in localStorage: A Security Guide for Web Developers
Learn why storing JWTs in localStorage is insecure and how to secure your web application's authentication, which is crucial for protecting user data
Dev.to · Damilola Owolabi
Inside Consumer DVRs — Hardware, Firmware & Network Security Evaluation
Learn about the hardware, firmware, and network security of consumer DVRs through a reverse engineering analysis of the Hikvision DS-7204HUHI-K
Medium · Cybersecurity
Cómo construimos un SOC con honeypot e IA local
Learn how to build a Security Operations Center (SOC) using honeypot and local AI to detect and prevent cyber threats
Dev.to · Yoandy Ramirez Delgado
Credentials in web applications: how to store them properly
Learn how to store credentials properly in web applications to prevent breaches
Dev.to · Ian Johnson
Up next
A single PR just hijacked the NPM registry...
Fireship
Watch →