As Internet of Things (IoT) devices and systems become increasingly commonplace in our interconnected and digitalized society, there will be a greater emphasis on the security of such devices and systems partly because of the data sensed, collected, disseminated, processed, and/or stored by and in these devices and systems. These devices and systems may also be targeted and abused as tools to facilitate other nefarious activities.

This six-course program is designed to provide the audience a broad overview of IoT security, starting with malware (botnet detection and malware analysis) followed by vulnerabilities, network monitoring, setting up of testbeds, and the application of blockchain.

Upon completion of this course program, technical professionals will understand:

  • How to examine IoT security technology
  • How IoT botnets grow their networks
  • The forensics of IoT malware
  • The importance of a taxonomy when designing an IoT system in terms of security
  • The need for IoT testbed and IoT network traffic datasets
  • The application of blockchain to IoT

Contact us today to learn more about getting access to course programs for your organization.

Want to gain access for your organization?

Complete the form below to be contacted by an IEEE representative and to receive information about IEEE Xplore and related products.


Courses Included in the Program:

  • Challenges and Opportunities
  • Botnet Detection
  • Malware Forensics
  • Business Case Studies
  • Directing Network Traffic
  • Blockchain Applications

IEEE eLearning courses are available in a wide range of topics, with many featured course series to choose from in various subtopics. Learn more about the full IEEE eLearning Library collection.

3D Printing Liquid Metal to Create Stretchable Electonic Devices

23 Jan 2019


As 5G Wireless Rolls Out, Experts Look Ahead to 6G

17 Jan 2019


Hand-Tracking Tech Is Taking Self-Driving Cars to the Next Level

5 Dec 2019

Author 1
Frede Blaabjerg


Harmonic Stability in Power Electronic Based Power Systems: Concept, Modeling, and Analysis

Author 2
Irith Pomeranz


Extra Clocking of LFSR Seeds for Improved Path Delay Fault Coverage