Offer extended through Aug. 31: Enterprises are deploying internet-of-things devices in their networks to reap manifold benefits, but they need expertise to properly secure them. Network World and Pluralsight have teamed up to offer this free course to provide that knowledge. Credit: PlargueDoctor / Getty Images IoT devices are proliferating on corporate networks, gathering data that enables organizations to make smarter business decisions, improve productivity and help avoid costly equipment failures, but there is one big downside – security of the internet of things remains a problem. It makes sense, then, for enterprises to try to spot vulnerabilities in the IoT gear in their networks before they can be exploited by malicious actors. To help this along, Network World and Pluralsight have teamed up to present a free course, Ethical Hacking: Hacking the Internet of Things, that provides IT pros with skills they need to protect their network infrastructure. Taught by Dale Meredith, a certified ethical hacker, the course describes the communication models IoT devices use and the architectures and protocols, according to the course description. That is augmented by a look at the threats IoT devices can pose if not managed properly, and “you’ll also learn about how to choose a manufacturer whose goals are also to protect your networks.” The course also delves into the attack tools that could be used against IoT devices and countermeasures to deploy that can defend them. Click here to sign up for this free course. All you’ll be asked for is your name and email address. Related content opinion Can your cloud backup provider fail? Cloud backup providers aren’t infallible. Be sure to ask hard questions of providers about their storage redundancy, geo-replication, data integrity measures, and disaster recovery capabilities. By Curtis Preston Apr 19, 2024 7 mins Backup and Recovery Cloud Computing Data Center news Cisco marries AI and security with cloud-based data center offering Cisco announces AI-based Hypershield, a self-upgrading security fabric that's designed to protect distributed applications, devices and data. By Michael Cooney Apr 18, 2024 5 mins Network Security Data Center how-to Shredding files on Linux with the shred command The shred command is a good option for removing files from a Linux system in a way that makes them virtually impossible to recover. By Sandra Henry-Stocker Apr 18, 2024 4 mins Linux news Intel announces edge AI processors New edge-optimized processors and FPGAs will power AI-enabled devices in vertical industries including retail, industrial and healthcare. By Andy Patrizio Apr 18, 2024 3 mins CPUs and Processors Edge Computing PODCASTS VIDEOS RESOURCES EVENTS NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe