The national and economic security of the United States depends on the reliable functioning of critical infrastructure and community stability. This course provides participants from throughout the various levels of government, private industry, and community an understanding of how they are all affected by the Internet of Things (IoT).
The purpose of this course is to provide an understanding of the history, definitions and components that make up IoT. It addresses the different applications of IoT, as well as applicable laws and policies, technologies, emerging threats, best practices, security and a variety of existing and developing technologies. This course is ideal for participants, from throughout the various levels of government, private industry and community, wanting to understand how they are affected by IoT.
Objectives
- Explain how IoT works
- Identify the pros and cons of IoT
- Identify current and future applications for consumers; commercial; critical infrastructure; industrial IoT; agriculture; Internet of Military Things (IoMT); and smart cities.
- Identify current and future IoT considerations
- Identify methods used to hack IoT devices
- Discuss steps users can take to reduce hacking risk
- Examine real-life case studies and “what if” scenarios that illustrate hacking of IoT devices
- Identify ways to recognize that hacking has occurred and who to contact
Target Audience
Federal, state, local, regional, tribal, and territorial government officials; owners and operators of businesses and non-profits; and community members and other individuals interested in understanding more about IoT.