DES 285 – OWASP IoT5: Mitigating Use of Insecure or Outdated Components

Course Overview


In this course, you will learn how to mitigate the risks associated with the use of deprecated or insecure software components/libraries that could allow the device to be compromised. This includes insecure customization of operating system platforms and the use of third-party software or hardware components from a compromised supply chain.

After you have completed this course, you will be able to identify and mitigate threats posed by insecure and outdated components.

Course Details

Course Number: DES 285
Course Duration: 12 minutes
Course CPE Credits: 0.25

NICE Specialty Areas

PlatformStandardType

Available Languages

  • English