Summary
We covered a lot of information in this chapter.
First, you learned about IoT devices, their associated risks and vulnerabilities, and how to solve them.
Then, you became familiar with all the different types of IoT network technologies available and their associated vulnerabilities.
But the best part is that you learned how to leverage these IoT devices (that most people see as threats) as great tools that you can deploy in your arsenal of defensive security tools.
Now, it's time to move to another fascinating and very relevant topic these days: cloud security (how to securely deploy and develop apps in the cloud).