Total Seminars

Secure Mobile, IoT & Secure Applications

Total Seminars

Secure Mobile, IoT & Secure Applications

This course is part of CompTIA Security+ Specialization

Dan LaChance
Lyndon Williams
Mike Meyers

Instructors: Dan LaChance

Included with Coursera Plus

Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

4 hours to complete
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

4 hours to complete
Flexible schedule
Learn at your own pace

Details to know

Shareable certificate

Add to your LinkedIn profile

Recently updated!

May 2026

Assessments

5 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

Build your subject-matter expertise

This course is part of the CompTIA Security+ Specialization
When you enroll in this course, you'll also be enrolled in this Specialization.
  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate

There are 5 modules in this course

This chapter introduces embedded platforms, industrial controllers, IoT functions, wireless standards, mobile limitations, device provisioning, infrastructure protection, smartphone hardening, and Zigbee security considerations.

What's included

5 videos1 reading1 assignment1 plugin

This chapter introduces embedded platforms, industrial controllers, IoT functions, wireless standards, mobile limitations, device provisioning, infrastructure protection, smartphone hardening, and Zigbee security considerations.

What's included

8 videos1 reading1 assignment3 plugins

This chapter reviews DNS usage, protocol security, hardened transfer methods, server protections, session threats, input risks, OWASP guidance, scanning tools, attack identification, and validation practices.

What's included

7 videos1 reading1 assignment4 plugins

This chapter reviews DNS usage, protocol security, hardened transfer methods, server protections, session threats, input risks, OWASP guidance, scanning tools, attack identification, and validation practices.

What's included

6 videos1 reading1 assignment1 plugin

What's included

1 assignment

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructors

Dan LaChance
Total Seminars
8 Courses4 learners
Lyndon Williams
Total Seminars
8 Courses4 learners

Offered by

Total Seminars

Explore more from Security

Why people choose Coursera for their career

Felipe M.

Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."

Jennifer J.

Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."

Larry W.

Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."

Chaitanya A.

"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."

Frequently asked questions