Secure Mobile, IoT & Secure Applications

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Secure Mobile, IoT & Secure Applications

Coursera · Intermediate ·🔐 Cybersecurity ·4d ago
This course covers the expanding attack surfaces of embedded systems, IoT devices, mobile platforms, and web applications, all critical areas in security and on the Security+ exam. Covering approximately 3.5 hours of expert instruction, learners develop the skills to secure a wide variety of specialized systems and application-layer communications. Learners benefit by understanding how to secure smartphones, IoT devices, and embedded systems; apply mobile device management (MDM); implement secure application-layer protocols; and identify and mitigate OWASP web application vulnerabilities including SQL injection, cross-site scripting, and CSRF. Online labs reinforce mobile security and application hardening tasks. By the end of this course, learners will be able to protect mobile and specialized systems, implement secure protocols, and defend web applications against common attack patterns.
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

The Biggest Cybersecurity Story of 2026? TeamPCP Claims Massive GitHub Breach
GitHub confirms major internal security breach in 2026, potentially the biggest cybersecurity story of the year
Medium · Cybersecurity
Nmap Series: Nmap Post Port Scans — Part 4.
Learn to leverage Nmap for post port scans to identify services and OS, a crucial skill for cybersecurity professionals
Medium · Cybersecurity
How to Map Out Your Digital Footprint Before Attackers Do in 2026
Learn to map your digital footprint to protect against cyber threats by using open-source intelligence techniques
Medium · Cybersecurity
The Most Dangerous Kind of Information
A single, obvious statement can collapse a system of minds due to the meta-cognition trap, highlighting the importance of critical thinking in cybersecurity
Medium · Cybersecurity
Up next
Your AWS IAM Starter Checklist
AWS Developers
Watch →