Certified IoT Specialist course (CIoTS)

11
COPYRIGHT © 2013 GICT TRAINING & CERTIFICATION. ALL RIGHTS RESERVED. Certified Internet of Things Specialist (CIoTs) INTRODUCTION The Internet of Things will involve trillions of connected devices which will use cloud computing and cloud based applications for accessibility. According to a report by Gartner, IoT will include 26 billion units installed by 2020 The real value of the Internet of Things is at the intersection of gathered data and leveraging the data for analytics. Till date IoT-enabled business processes were primarily in, on-premises data centers or in the cloud. But according the latest Forrester report of predictions for IoT in 2018: 1. Enterprises will move their IoT data processing and analysis from core cloud computing to the edge of the network in order to cut costs and improve on latency. But the edge IoT devices will continue to take advantage of the cloud for scalability, configuration and security until deployment.

description

Certified IoT Specialist course (CIoTS) https://globalicttraining.com/certified-internet-of-things-specialist-ciots/

Transcript of Certified IoT Specialist course (CIoTS)

Page 1: Certified IoT Specialist course (CIoTS)

COPYRIGHT © 2013 GICT TRAINING & CERTIFICATION. ALL RIGHTS RESERVED.

Certified Internet of Things Specialist (CIoTs)

INTRODUCTION

The Internet of Things will involve trillions of connected devices which will use cloud computing

and cloud based applications for accessibility.

According to a report by Gartner, IoT will include 26 billion units installed by 2020

The real value of the Internet of Things is at the intersection of gathered data and leveraging the

data for analytics. Till date IoT-enabled business processes were primarily in, on-premises data

centers or in the cloud.

But according the latest Forrester report of predictions for IoT in 2018:

1. Enterprises will move their IoT data processing and analysis from core cloud computing

to the edge of the network in order to cut costs and improve on latency. But the edge IoT

devices will continue to take advantage of the cloud for scalability, configuration and

security until deployment.

Page 2: Certified IoT Specialist course (CIoTS)

COPYRIGHT © 2013 GICT TRAINING & CERTIFICATION. ALL RIGHTS RESERVED.

2. IoT will become more specialized and the IoT platforms will be designed for specific

industries. Hence it will move away from the usage of generic hardware and software that

had been the norm from past many years.

3. There will be emergence of new guidelines for commercializing IoT data. 45% of data and

analytics decision makers at US enterprises claim they have already started

commercializing on data. 35% of those at French and 38% of German enterprises too

claim to do so. New guidelines will be issued to spark the data economy

4. There will be increased awareness on IoT security but unfortunately the risk is bound to

grow with greater connectivity. Facilities implementing IoT will need to focus on updating

devices with secured protocols and sensor to sensor communication and sensor to

gateway communication

Overall IoT adopters are looking at low adoption costs, faster deployments, global reach, easy

integration with other systems, low maintenance and last but not the least all with enhanced

security.

This course will focus on the core technologies behind Internet of Things. This certification

leverages and explores the infrastructure, communication, sensor technologies, networking

technologies, data/storage/analytics and security aspects of IoT in building the next-generation

computing realm, which makes the world fully connected.

After the course, participants will have a good understanding of the different pieces of an IoT

system and how they interact.

Job Role in NICF / TARGET AUDIENCE

• Cloud Operations Engineer

• Senior Cloud Operations Engineer

• Data Analyst - Statistics and Mining

Page 3: Certified IoT Specialist course (CIoTS)

COPYRIGHT © 2013 GICT TRAINING & CERTIFICATION. ALL RIGHTS RESERVED.

• Data Analyst - Text Analytics

• Operations Research Analyst

Page 4: Certified IoT Specialist course (CIoTS)

COPYRIGHT © 2013 GICT TRAINING & CERTIFICATION. ALL RIGHTS RESERVED.

PRE-REQUISITES

Participants are preferred to have min. 2 years of experience in software development, business

domain or data/business analysis.

PROGRAM STRUCTURE

This is a 5-day intensive training program with the following assessment components.

Component 1. Written Examination

Component 2. Project Work Component (PWC)

These components are individual based. Participants will need to obtain 70% in both the

components in order to qualify for this certification. If the participant fail one of the

components, they will not pass the course and have to re-take that particular failed

component. If they fail both components, they will have to re-take the assessment.

COURSE OUTCOMES

Understand the concepts of IoT and its impact on business & government

organizations

Understand the various components and architecture of IoT

Design and develop smart IoT Applications using Carriots

Design and develop smart IoT Applications using Node-RED leveraging the message

queuing IoT protocol

Design and develop dashboards for Sigfox enabled IoT devices to appreciate Low

Power WAN in IoT

Understand the Functional Components and Classification of the IoT Middleware

Page 5: Certified IoT Specialist course (CIoTS)

COPYRIGHT © 2013 GICT TRAINING & CERTIFICATION. ALL RIGHTS RESERVED.

Acquire the knowledge on Machine Learning for intelligent IoT

Analyze and explore the security and privacy challenges in IoT

Page 6: Certified IoT Specialist course (CIoTS)

COPYRIGHT © 2013 GICT TRAINING & CERTIFICATION. ALL RIGHTS RESERVED.

COURSE SESSION SCHEDULE

Session 1

(9:00 – 10:45)

Session 2

(11:00 – 12:30)

Session 3

(13:45 – 15:15)

Session 4

(15:30 – 17:00)

Day 1 Context Setting and

Introduction IoT Applications Overview of IoT

Components &

Elements of IoT

Day 2 Architecture of IoT

system

Architecture of IoT

system Hands-on 1

Day 3 Middleware of IoT Middleware of IoT Hands-on 2

Day 4 IoT Device

Management

Machine Learning

for intelligent IoT Hands-on 3

Day 5 Databases for IoT Security aspects of

IoT Hands-on 4

Review, Discussion

& Assessment

Page 7: Certified IoT Specialist course (CIoTS)

COPYRIGHT © 2013 GICT TRAINING & CERTIFICATION. ALL RIGHTS RESERVED.

COURSE OUTLINE

Unit 1. Introduction to IoT

o What is IoT?

o Effects of IoT

o Skill set for IoT

o Challenges and barriers to IoT

o Functional Requirements of IoT

Unit 2. IoT Applications

o Smart Cities

o Smart Environment

o Smart Water

o Smart Metering

o Security & Emergencies

o Retail

o Smart Logistics

o Industrial Control

o Smart Agriculture

o Smart Animal Farming

o Home Automation

o eHealth

Page 8: Certified IoT Specialist course (CIoTS)

COPYRIGHT © 2013 GICT TRAINING & CERTIFICATION. ALL RIGHTS RESERVED.

Unit 3. Overview of IoT

o Communication aspects involved in IoT system

Wired connectivity and technologies

Wireless connectivity and technologies

o Power and Energy Management & Optimization

o Network Topologies for IoT

o IoT Protocols

o IoT – Technologies & Software

Unit 4. Components & Elements of IoT

o Components of IoT

o Elements of IoT

Radio Frequency Identification (RFID)

Wireless Sensor Networks (WSN)

Addressing schemes

Data, storage and analytics

Visualization

Security

Unit 5. Architecture of IoT system

o Internet of Things—Architecture – IoT-A

o The IoT-A Reference Model

o Backbone technologies for IoT

o Middleware for IoT

Page 9: Certified IoT Specialist course (CIoTS)

COPYRIGHT © 2013 GICT TRAINING & CERTIFICATION. ALL RIGHTS RESERVED.

o Machine Learning for intelligent IoT

o Management of IoT

Unit 6. Databases for IoT

o Big Data turning into “HUGE DATA”

o SQL Databases

o NoSQL Databases

o Cloud Databases

Unit 7. Security Aspects of IoT

o IoT Security Aspects

o IoT features leading to security issues

o Security Issues in IoT based on RFID

o Design Considerations for

IoT Technologies

Unit 8. Privacy Aspects of IoT

o Privacy Analysis

o Data Loss – RFID, Bluetooth, Big Data

o Mechanisms to Prevent Privacy Hack

o Popular Privacy Legislations

o Case Study

o Privacy Enhancing Technologies (PET)

o Few Approaches to IoT Privacy

o Practical tips to Handle IoT Privacy

Page 10: Certified IoT Specialist course (CIoTS)

COPYRIGHT © 2013 GICT TRAINING & CERTIFICATION. ALL RIGHTS RESERVED.

HANDS-ON

Participants will have guided hands-on sessions on IoT to get firsthand knowledge about IoT and backbone

technologies needed to build IoT applications. During this session they will gain understanding of several

factors in building a successful IoT system.

The program consists of three hands-on sessions, three hours duration each. Also, participants will have

demonstration session on Arduino, Raspberry PI, ESP8266, UnaShield V2S Arduino Shield for Sigfox with

antenna, Node-RED, RapidMiner

Hands-on 1: Setup and configure an IoT platform such as Carriots. Further, participants will also perform

building applications and managing devices connected to Internet.

Hands-on 2: Set up and configure Dashboard using Node-RED, create the flow, and prepare the Arduino

IDE to upload the code in ESP8266 module. The circuit is built without any coding.

Hands-on 3: Set up and configure Arduino to read the UnaShield’s onboard sensors and send the sensor

data to the Sigfox network. To process the sensor data, set up a Sigfox Callback to transmit the data to an

IoT platform.

Hands-on 4: Participants will perform business analytics on an IoT application data (including data loading

and analysis operations) using an open source BA tool.

Page 11: Certified IoT Specialist course (CIoTS)

COPYRIGHT © 2013 GICT TRAINING & CERTIFICATION. ALL RIGHTS RESERVED.

WRITTEN ASSESSMENT

As part of the written examination, each participant will be assessed individually on the last day of

the training for their understanding of the subject matter and ability to evaluate, choose and apply

them in specific context and also the ability to identify and manage risks. The assessment focuses on

higher levels of learning in Bloom’s taxonomy: Application, Analysis, Synthesis and Evaluation.

This written examination will primarily consist of 40 multiple choice questions spanning various

aspects as covered in the program. It is an individual, competency-based assessment.

EXAM PREPARATION

The objective of the certification examination is to evaluate the knowledge and skills acquired by the

participants during the course. The weightage in key topics of the course as follows:

Introduction to IoT [10%]

IoT Applications – Use Cases [8%]

Overview of IoT [12%]

Components of IoT [10%]

Architecture of IoT system [20%]

Databases for IoT [8%]

Mobile integration to IoT [7%]

Security Aspects of IoT [10%]

Privacy Aspects of IoT [15%]

SOFTWARES USED

Arduino

Carriots

Node-RED

Sigfox Backend dashboard

RapidMiner