Learning Objectives
On successful completion of this course, learners should have the knowledge and skills to Identify best practices to protect network services on IoT devices, including:
- Only open necessary ports
- Avoid overexposing ports
- Block unusual traffic
- Mitigate DoS vulnerabilities
- Mitigate memory corruption vulnerabilities
- Disable outdated protocols
Framework Connections
Specialty Areas
- Risk Management
- Software Development
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.