Certified IoT Specialist course (CIoTS)
description
Transcript of Certified IoT Specialist course (CIoTS)
COPYRIGHT © 2013 GICT TRAINING & CERTIFICATION. ALL RIGHTS RESERVED.
Certified Internet of Things Specialist (CIoTs)
INTRODUCTION
The Internet of Things will involve trillions of connected devices which will use cloud computing
and cloud based applications for accessibility.
According to a report by Gartner, IoT will include 26 billion units installed by 2020
The real value of the Internet of Things is at the intersection of gathered data and leveraging the
data for analytics. Till date IoT-enabled business processes were primarily in, on-premises data
centers or in the cloud.
But according the latest Forrester report of predictions for IoT in 2018:
1. Enterprises will move their IoT data processing and analysis from core cloud computing
to the edge of the network in order to cut costs and improve on latency. But the edge IoT
devices will continue to take advantage of the cloud for scalability, configuration and
security until deployment.
COPYRIGHT © 2013 GICT TRAINING & CERTIFICATION. ALL RIGHTS RESERVED.
2. IoT will become more specialized and the IoT platforms will be designed for specific
industries. Hence it will move away from the usage of generic hardware and software that
had been the norm from past many years.
3. There will be emergence of new guidelines for commercializing IoT data. 45% of data and
analytics decision makers at US enterprises claim they have already started
commercializing on data. 35% of those at French and 38% of German enterprises too
claim to do so. New guidelines will be issued to spark the data economy
4. There will be increased awareness on IoT security but unfortunately the risk is bound to
grow with greater connectivity. Facilities implementing IoT will need to focus on updating
devices with secured protocols and sensor to sensor communication and sensor to
gateway communication
Overall IoT adopters are looking at low adoption costs, faster deployments, global reach, easy
integration with other systems, low maintenance and last but not the least all with enhanced
security.
This course will focus on the core technologies behind Internet of Things. This certification
leverages and explores the infrastructure, communication, sensor technologies, networking
technologies, data/storage/analytics and security aspects of IoT in building the next-generation
computing realm, which makes the world fully connected.
After the course, participants will have a good understanding of the different pieces of an IoT
system and how they interact.
Job Role in NICF / TARGET AUDIENCE
• Cloud Operations Engineer
• Senior Cloud Operations Engineer
• Data Analyst - Statistics and Mining
COPYRIGHT © 2013 GICT TRAINING & CERTIFICATION. ALL RIGHTS RESERVED.
• Data Analyst - Text Analytics
• Operations Research Analyst
COPYRIGHT © 2013 GICT TRAINING & CERTIFICATION. ALL RIGHTS RESERVED.
PRE-REQUISITES
Participants are preferred to have min. 2 years of experience in software development, business
domain or data/business analysis.
PROGRAM STRUCTURE
This is a 5-day intensive training program with the following assessment components.
Component 1. Written Examination
Component 2. Project Work Component (PWC)
These components are individual based. Participants will need to obtain 70% in both the
components in order to qualify for this certification. If the participant fail one of the
components, they will not pass the course and have to re-take that particular failed
component. If they fail both components, they will have to re-take the assessment.
COURSE OUTCOMES
Understand the concepts of IoT and its impact on business & government
organizations
Understand the various components and architecture of IoT
Design and develop smart IoT Applications using Carriots
Design and develop smart IoT Applications using Node-RED leveraging the message
queuing IoT protocol
Design and develop dashboards for Sigfox enabled IoT devices to appreciate Low
Power WAN in IoT
Understand the Functional Components and Classification of the IoT Middleware
COPYRIGHT © 2013 GICT TRAINING & CERTIFICATION. ALL RIGHTS RESERVED.
Acquire the knowledge on Machine Learning for intelligent IoT
Analyze and explore the security and privacy challenges in IoT
COPYRIGHT © 2013 GICT TRAINING & CERTIFICATION. ALL RIGHTS RESERVED.
COURSE SESSION SCHEDULE
Session 1
(9:00 – 10:45)
Session 2
(11:00 – 12:30)
Session 3
(13:45 – 15:15)
Session 4
(15:30 – 17:00)
Day 1 Context Setting and
Introduction IoT Applications Overview of IoT
Components &
Elements of IoT
Day 2 Architecture of IoT
system
Architecture of IoT
system Hands-on 1
Day 3 Middleware of IoT Middleware of IoT Hands-on 2
Day 4 IoT Device
Management
Machine Learning
for intelligent IoT Hands-on 3
Day 5 Databases for IoT Security aspects of
IoT Hands-on 4
Review, Discussion
& Assessment
COPYRIGHT © 2013 GICT TRAINING & CERTIFICATION. ALL RIGHTS RESERVED.
COURSE OUTLINE
Unit 1. Introduction to IoT
o What is IoT?
o Effects of IoT
o Skill set for IoT
o Challenges and barriers to IoT
o Functional Requirements of IoT
Unit 2. IoT Applications
o Smart Cities
o Smart Environment
o Smart Water
o Smart Metering
o Security & Emergencies
o Retail
o Smart Logistics
o Industrial Control
o Smart Agriculture
o Smart Animal Farming
o Home Automation
o eHealth
COPYRIGHT © 2013 GICT TRAINING & CERTIFICATION. ALL RIGHTS RESERVED.
Unit 3. Overview of IoT
o Communication aspects involved in IoT system
Wired connectivity and technologies
Wireless connectivity and technologies
o Power and Energy Management & Optimization
o Network Topologies for IoT
o IoT Protocols
o IoT – Technologies & Software
Unit 4. Components & Elements of IoT
o Components of IoT
o Elements of IoT
Radio Frequency Identification (RFID)
Wireless Sensor Networks (WSN)
Addressing schemes
Data, storage and analytics
Visualization
Security
Unit 5. Architecture of IoT system
o Internet of Things—Architecture – IoT-A
o The IoT-A Reference Model
o Backbone technologies for IoT
o Middleware for IoT
COPYRIGHT © 2013 GICT TRAINING & CERTIFICATION. ALL RIGHTS RESERVED.
o Machine Learning for intelligent IoT
o Management of IoT
Unit 6. Databases for IoT
o Big Data turning into “HUGE DATA”
o SQL Databases
o NoSQL Databases
o Cloud Databases
Unit 7. Security Aspects of IoT
o IoT Security Aspects
o IoT features leading to security issues
o Security Issues in IoT based on RFID
o Design Considerations for
IoT Technologies
Unit 8. Privacy Aspects of IoT
o Privacy Analysis
o Data Loss – RFID, Bluetooth, Big Data
o Mechanisms to Prevent Privacy Hack
o Popular Privacy Legislations
o Case Study
o Privacy Enhancing Technologies (PET)
o Few Approaches to IoT Privacy
o Practical tips to Handle IoT Privacy
COPYRIGHT © 2013 GICT TRAINING & CERTIFICATION. ALL RIGHTS RESERVED.
HANDS-ON
Participants will have guided hands-on sessions on IoT to get firsthand knowledge about IoT and backbone
technologies needed to build IoT applications. During this session they will gain understanding of several
factors in building a successful IoT system.
The program consists of three hands-on sessions, three hours duration each. Also, participants will have
demonstration session on Arduino, Raspberry PI, ESP8266, UnaShield V2S Arduino Shield for Sigfox with
antenna, Node-RED, RapidMiner
Hands-on 1: Setup and configure an IoT platform such as Carriots. Further, participants will also perform
building applications and managing devices connected to Internet.
Hands-on 2: Set up and configure Dashboard using Node-RED, create the flow, and prepare the Arduino
IDE to upload the code in ESP8266 module. The circuit is built without any coding.
Hands-on 3: Set up and configure Arduino to read the UnaShield’s onboard sensors and send the sensor
data to the Sigfox network. To process the sensor data, set up a Sigfox Callback to transmit the data to an
IoT platform.
Hands-on 4: Participants will perform business analytics on an IoT application data (including data loading
and analysis operations) using an open source BA tool.
COPYRIGHT © 2013 GICT TRAINING & CERTIFICATION. ALL RIGHTS RESERVED.
WRITTEN ASSESSMENT
As part of the written examination, each participant will be assessed individually on the last day of
the training for their understanding of the subject matter and ability to evaluate, choose and apply
them in specific context and also the ability to identify and manage risks. The assessment focuses on
higher levels of learning in Bloom’s taxonomy: Application, Analysis, Synthesis and Evaluation.
This written examination will primarily consist of 40 multiple choice questions spanning various
aspects as covered in the program. It is an individual, competency-based assessment.
EXAM PREPARATION
The objective of the certification examination is to evaluate the knowledge and skills acquired by the
participants during the course. The weightage in key topics of the course as follows:
Introduction to IoT [10%]
IoT Applications – Use Cases [8%]
Overview of IoT [12%]
Components of IoT [10%]
Architecture of IoT system [20%]
Databases for IoT [8%]
Mobile integration to IoT [7%]
Security Aspects of IoT [10%]
Privacy Aspects of IoT [15%]
SOFTWARES USED
Arduino
Carriots
Node-RED
Sigfox Backend dashboard
RapidMiner