This module introduces you to the IoT security infrastructure, security best practices, threat modeling, and the security tasks that are assigned to the various roles that contribute to an IoT solution.
After you complete this module, you will be able to:
- Describe security recommendations.
- Describe the IoT security infrastructure and security-in-depth strategy.
- Describe threat modeling and mitigation techniques.