By the end of this video, you should be able to:
Explain what embedded operating systems are and where they’re used
Describe the Internet of Things (IoT) and other embedded operating systems
Identify vulnerabilities of embedded operating systems and best practices for protecting them