Securing Cloud and IoT Applications Training Course
IoT application security refers to the technology and processes used to develop, manage and monitor the applications that control networked devices in an IoT system.
This instructor-led, live training (online or onsite) is aimed at engineers who wish to set up, deploy and manage a secure IoT application.
By the end of this training, participants will be able to:
- Develop and deploy applications to manage IoT devices securely.
- Securely integrate IoT devices to the Cloud.
- Integrate an IoT application with existing infrastructure.
Format of the course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- This course can be based on any of the major cloud providers: AWS, Google Cloud, and Azure.
- To request a customized training, please contact us to arrange.
Course Outline
Introduction
Preparing the Development Environment
- Device, development tools, SDK
IoT Security Services
- AWS IoT
- Google Cloud IoT Core
- Microsoft Azure Sphere
Planning an IoT Application
- Deciding Application Features
- Types of Device: Sensors, LCD Screens, Buzzers, etc.
- Certified vs Non-Certified IoT Devices
Anatomy of an IoT Device
- Microcontroller, Sensor, Battery, etc.
The IoT Ecosystem
- An architectural overview
- Cloud server security
- Device security
- Application security
Case Studies: Hacking a Home's Temperature Sensor.
IoT Security Lifecycle
- Security engineering processes
- OWASP Internet of Things (IoT) Project
Designing a Secure IoT Application
- Secure Communications (HTTPS, TLS/SSL, etc.)
- Data Integrity (Encryption, Hashing, etc.)
- Identity and Access Management
Scaling an Application
- Fault Tolerance
Integration IoT Devices into Existing Security Infrastructure
- Extending existing systems
Deploying an IoT Application
- Monitoring the Application
- Testing the security of the application
Assessment
- IoT Privacy Impact Assessment (PIA)
- Safety Impact Assessment
Troubleshooting
Summary and Conclusion
Requirements
- An understanding of networking principles.
- Programming experience in any language.
- A cloud provider account.
Audience
- Developers
- Security professionals
- IoT architects
Open Training Courses require 5+ participants.
Securing Cloud and IoT Applications Training Course - Booking
Securing Cloud and IoT Applications Training Course - Enquiry
Securing Cloud and IoT Applications - Consultancy Enquiry
Consultancy Enquiry
Testimonials (5)
The ability of the trainer to align the course with the requirements of the organization other than just providing the course for the sake of delivering it.
Masilonyane - Revenue Services Lesotho
Course - Big Data Business Intelligence for Govt. Agencies
The oral skills and human side of the trainer (Augustin).
Jeremy Chicon - TE Connectivity
Course - NB-IoT for Developers
The training was relevant to my needs and I would be able to apply the lessons learnt to meet my challenging needs
Botshabelo Jason - Water Utilities Botswana
Course - IoT Fundamentals and Frontiers : For Managers, CXO, VP, Investors and Entrepreneurs
Multiple examples.
Jagoda Olszanska - Impel SA
Course - IoT (Internet of Things) - Technology Overview
Machine Translated
How friendly the trainer was. The flexibility and answering my questions.
Saed El-kayed - International Committee of the Red Cross (ICRC)
Course - IoT Security
Provisional Courses
Related Courses
Big Data Business Intelligence for Govt. Agencies
35 HoursAdvances in technologies and the increasing amount of information are transforming how business is conducted in many industries, including government. Government data generation and digital archiving rates are on the rise due to the rapid growth of mobile devices and applications, smart sensors and devices, cloud computing solutions, and citizen-facing portals. As digital information expands and becomes more complex, information management, processing, storage, security, and disposition become more complex as well. New capture, search, discovery, and analysis tools are helping organizations gain insights from their unstructured data. The government market is at a tipping point, realizing that information is a strategic asset, and government needs to protect, leverage, and analyze both structured and unstructured information to better serve and meet mission requirements. As government leaders strive to evolve data-driven organizations to successfully accomplish mission, they are laying the groundwork to correlate dependencies across events, people, processes, and information.
High-value government solutions will be created from a mashup of the most disruptive technologies:
- Mobile devices and applications
- Cloud services
- Social business technologies and networking
- Big Data and analytics
IDC predicts that by 2020, the IT industry will reach $5 trillion, approximately $1.7 trillion larger than today, and that 80% of the industry's growth will be driven by these 3rd Platform technologies. In the long term, these technologies will be key tools for dealing with the complexity of increased digital information. Big Data is one of the intelligent industry solutions and allows government to make better decisions by taking action based on patterns revealed by analyzing large volumes of data — related and unrelated, structured and unstructured.
But accomplishing these feats takes far more than simply accumulating massive quantities of data.“Making sense of thesevolumes of Big Datarequires cutting-edge tools and technologies that can analyze and extract useful knowledge from vast and diverse streams of information,” Tom Kalil and Fen Zhao of the White House Office of Science and Technology Policy wrote in a post on the OSTP Blog.
The White House took a step toward helping agencies find these technologies when it established the National Big Data Research and Development Initiative in 2012. The initiative included more than $200 million to make the most of the explosion of Big Data and the tools needed to analyze it.
The challenges that Big Data poses are nearly as daunting as its promise is encouraging. Storing data efficiently is one of these challenges. As always, budgets are tight, so agencies must minimize the per-megabyte price of storage and keep the data within easy access so that users can get it when they want it and how they need it. Backing up massive quantities of data heightens the challenge.
Analyzing the data effectively is another major challenge. Many agencies employ commercial tools that enable them to sift through the mountains of data, spotting trends that can help them operate more efficiently. (A recent study by MeriTalk found that federal IT executives think Big Data could help agencies save more than $500 billion while also fulfilling mission objectives.).
Custom-developed Big Data tools also are allowing agencies to address the need to analyze their data. For example, the Oak Ridge National Laboratory’s Computational Data Analytics Group has made its Piranha data analytics system available to other agencies. The system has helped medical researchers find a link that can alert doctors to aortic aneurysms before they strike. It’s also used for more mundane tasks, such as sifting through résumés to connect job candidates with hiring managers.
Insurtech: A Practical Introduction for Managers
14 HoursInsurtech (a.k.a Digital Insurance) refers to the convergence of insurance + new technologies. In the field of Insurtech "digital insurers" apply technology innovations to their business and operating models in order to reduce costs, improve the customer experience and enhance the agility of their operations.
In this instructor-led training, participants will gain an understanding of the technologies, methods and mindset needed to bring about a digital transformation within their organizations and in the industry at large. The training is aimed at managers who need to gain a big picture understanding, break down the hype and jargon, and take the first steps in establishing an Insurtech strategy.
By the end of this training, participants will be able to:
- Discuss Insurtech and all its component parts intelligently and systematically
- Identify and demystify the role of each key technology within Insurtech.
- Draft a general strategy for implementing Insurtech within their organization
Audience
- Insurers
- Technologists within the insurance industry
- Insurance stakeholders
- Consultants and business analysts
Format of the course
- Part lecture, part discussion, exercises and case study group activities
Digital Transformation with IoT and Edge Computing
14 HoursThis instructor-led, live training in Poland (online or onsite) is aimed at intermediate-level IT professionals and business managers who wish to understand the potential of IoT and edge computing for enabling efficiency, real-time processing, and innovation in various industries.
By the end of this training, participants will be able to:
- Understand the principles of IoT and edge computing and their role in digital transformation.
- Identify use cases for IoT and edge computing in manufacturing, logistics, and energy sectors.
- Differentiate between edge and cloud computing architectures and deployment scenarios.
- Implement edge computing solutions for predictive maintenance and real-time decision-making.
Edge AI for IoT Applications
14 HoursThis instructor-led, live training in Poland (online or onsite) is aimed at intermediate-level developers, system architects, and industry professionals who wish to leverage Edge AI for enhancing IoT applications with intelligent data processing and analytics capabilities.
By the end of this training, participants will be able to:
- Understand the fundamentals of Edge AI and its application in IoT.
- Set up and configure Edge AI environments for IoT devices.
- Develop and deploy AI models on edge devices for IoT applications.
- Implement real-time data processing and decision-making in IoT systems.
- Integrate Edge AI with various IoT protocols and platforms.
- Address ethical considerations and best practices in Edge AI for IoT.
Edge Computing
7 HoursThis instructor-led, live training in Poland (online or onsite) is aimed at product managers and developers who wish to use Edge Computing to decentralize data management for faster performance, leveraging smart devices located on the source network.
By the end of this training, participants will be able to:
- Understand the basic concepts and advantages of Edge Computing.
- Identify the use cases and examples where Edge Computing can be applied.
- Design and build Edge Computing solutions for faster data processing and reduced operational costs.
Federated Learning in IoT and Edge Computing
14 HoursThis instructor-led, live training in Poland (online or onsite) is aimed at intermediate-level professionals who wish to apply Federated Learning to optimize IoT and edge computing solutions.
By the end of this training, participants will be able to:
- Understand the principles and benefits of Federated Learning in IoT and edge computing.
- Implement Federated Learning models on IoT devices for decentralized AI processing.
- Reduce latency and improve real-time decision-making in edge computing environments.
- Address challenges related to data privacy and network constraints in IoT systems.
Introduction to IoT Using Arduino
14 HoursIn this instructor-led, live training in Poland, participants will learn the fundamentals of IoT as they step through the creation of an Arduino-based IoT sensor system.
By the end of this training, participants will be able to:
- Understand the principles of IoT, including IoT components and communication techniques.
- Learn how to use Arduino communication modules that can be used for different IoT systems.
- Learn how to use and program a mobile app to control Arduino.
- Use a Wi-Fi module to connect the Arduino to another device.
- Build and deploy their own IoT Sensor System.
IoT Fundamentals and Frontiers : For Managers, CXO, VP, Investors and Entrepreneurs
21 HoursUnlike other technologies, IoT is far more complex encompassing almost every branch of core Engineering-Mechanical, Electronics, Firmware, Middleware, Cloud, Analytics and Mobile. For each of its engineering layers, there are aspects of economics, standards, regulations and evolving state of the art. This is for the firs time, a modest course is offered to cover all of these critical aspects of IoT Engineering.
Summary
An advanced training program covering the current state of the art in Internet of Things
Cuts across multiple technology domains to develop awareness of an IoT system and its components and how it can help businesses and organizations.
Live demo of model IoT applications to showcase practical IoT deployments across different industry domains, such as Industrial IoT, Smart Cities, Retail, Travel & Transportation and use cases around connected devices & things
Target Audience
Managers responsible for business and operational processes within their respective organizations and want to know how to harness IoT to make their systems and processes more efficient.
Entrepreneurs and Investors who are looking to build new ventures and want to develop a better understanding of the IoT technology landscape to see how they can leverage it in an effective manner.
Estimates for Internet of Things or IoT market value are massive, since by definition the IoT is an integrated and diffused layer of devices, sensors, and computing power that overlays entire consumer, business-to-business, and government industries. The IoT will account for an increasingly huge number of connections: 1.9 billion devices today, and 9 billion by 2018. That year, it will be roughly equal to the number of smartphones, smart TVs, tablets, wearable computers, and PCs combined.
In the consumer space, many products and services have already crossed over into the IoT, including kitchen and home appliances, parking, RFID, lighting and heating products, and a number of applications in Industrial Internet.
However, the underlying technologies of IoT are nothing new as M2M communication existed since the birth of Internet. However what changed in last couple of years is the emergence of number of inexpensive wireless technologies added by overwhelming adaptation of smart phones and Tablet in every home. Explosive growth of mobile devices led to present demand of IoT.
Due to unbounded opportunities in IoT business, a large number of small and medium sized entrepreneurs jumped on a bandwagon of IoT gold rush. Also due to emergence of open source electronics and IoT platform, cost of development of IoT system and further managing its sizable production is increasingly affordable. Existing electronic product owners are experiencing pressure to integrate their device with Internet or Mobile app.
This training is intended for a technology and business review of an emerging industry so that IoT enthusiasts/entrepreneurs can grasp the basics of IoT technology and business.
Course Objective
Main objective of the course is to introduce emerging technological options, platforms and case studies of IoT implementation in home & city automation (smart homes and cities), Industrial Internet, healthcare, Govt., Mobile Cellular and other areas.
Basic introduction of all the elements of IoT-Mechanical, Electronics/sensor platform, Wireless and wireline protocols, Mobile to Electronics integration, Mobile to enterprise integration, Data-analytics and Total control plane
M2M Wireless protocols for IoT- WiFi, Zigbee/Zwave, Bluetooth, ANT+ : When and where to use which one?
Mobile/Desktop/Web app- for registration, data acquisition and control –Available M2M data acquisition platform for IoT-–Xively, Omega and NovoTech, etc.
Security issues and security solutions for IoT
Open source/commercial electronics platform for IoT-Raspberry Pi, Arduino , ArmMbedLPC etc
Open source /commercial enterprise cloud platform for AWS-IoT apps, Azure -IOT, Watson-IOT cloud in addition to other minor IoT clouds
Studies of business and technology of some of the common IoT devices like Home automation, Smoke alarm, vehicles, military, home health etc.
Industrial IoT (Internet of Things) for Manufacturing Professionals
21 HoursUnlike other technologies, IoT is far more complex encompassing almost every branch of core Engineering-Mechanical, Electronics, Firmware, Middleware, Cloud, Analytics and Mobile. For each of its engineering layers, there are aspects of economics, standards, regulations and evolving state of the art. This is for the firs time, a modest course is offered to cover all of these critical aspects of IoT Engineering.
For manufacturing professional, most critical aspect is to understand the advancement in the area of Industrial Internet of things, which includes predictive and preventative maintenance, condition based monitoring of the machines, production optimization, energy optimization, supply-chain optimization and uptime of manufacturing utilities etc.
Summary
- An advanced training program covering the current state of the art in Internet of Things in Smart Factories.
- Cuts across multiple technology domains to develop awareness of an IoT system and its components and how it can help manufacturing managerial professionals
- Live demo of model IIoT applications for smart factories
Target Audience
- Managers responsible for business and operational processes within their respective manufacturing organizations and want to know how to harness IoT to make their systems and processes more efficient.
Duration 3 Days ( 8 hours / day)
Estimates for Internet of Things or IoT market value are massive, since by definition the IoT is an integrated and diffused layer of devices, sensors, and computing power that overlays entire consumer, business-to-business, and government industries. The IoT will account for an increasingly huge number of connections: 1.9 billion devices today, and 9 billion by 2018. That year, it will be roughly equal to the number of smartphones, smart TVs, tablets, wearable computers, and PCs combined.
In the consumer space, many products and services have already crossed over into the IoT, including kitchen and home appliances, parking, RFID, lighting and heating products, and a number of applications in Industrial Internet.
However the underlying technologies of IoT are nothing new as M2M communication existed since the birth of Internet. However what changed in last couple of years is the emergence of number of inexpensive wireless technologies added by overwhelming adaptation of smart phones and Tablet in every home. Explosive growth of mobile devices led to present demand of IoT.
Industrial IoT, or IIoT for manufacturing has been widely in use since 2014 and since then a large number of IIoT innovations have taken place. This course will introduce all the important aspects of innovations in Industrial IoT area.
This training is intended for a technology and business review of an emerging industry so that IoT enthusiasts/entrepreneurs can grasp the basics of IoT technology and business.
Course Objective
Main objective of the course is to introduce emerging technological options, platforms and case studies of IoT implementation in smart factories for manufacturing sectors.
- Studies of business and technology of some of the common IIoT platform like Siemens MindSphere and Azure IoT.
- Open source /commercial enterprise cloud platform for AWS-IoT apps, Azure -IOT, Watson-IOT, Mindsphere IIoT cloud in addition to other minor IoT clouds
- Open source/commercial electronics platform for IoT-Raspberry Pi, Arduino , ArmMbedLPC etc
- Security issues and security solutions for IIoT
- Mobile/Desktop/Web app- for registration, data acquisition and control –
- M2M Wireless protocols for IoT- WiFi, LoPan, BLE, Ethernet, Ethercat, PLC : When and where to use which one?
- Basic introduction of all the elements of IoT-Mechanical, Electronics/sensor platform, Wireless and wireline protocols, Mobile to Electronics integration, Mobile to enterprise integration, Data-analytics and Total control plane
Introduction to IoT Using Raspberry Pi
14 HoursInternet of Things (IoT) is a network infrastructure that connects physical objects and software applications wirelessly, allowing them to communicate with each other and exchange data via network communications, cloud computing, and data capture.
In this instructor-led, live training, participants will learn the fundamentals of IoT as they step through the creation of an IoT sensor system using the Raspberry Pi.
By the end of this training, participants will be able to:
- Understand the principles of IoT, including IoT components and communication techniques
- Learn how to set up the Raspberry Pi specifically for IoT applications
- Build and deploy their own IoT Sensor System
Audience
- Hobbyists
- Hardware/software engineers and technicians
- Technical persons in all industries
- Beginner developers
Format of the course
- Part lecture, part discussion, exercises and heavy hands-on practice
Note
- Raspberry Pi supports various operating systems and programming languages. This course will use Linux-based Raspbian as the operating system and Python as the programming language. To request a specific setup, please contact us to arrange.
- Participants are responsible for purchasing the Raspberry Pi hardware and components.
IoT Security
21 HoursOver the last three years, engineering in IoT has seen massive changes primarily driven by Microsoft, Google and Amazon. These large behemoths have invested billions of dollars to develop IoT platforms that are more easy to manage and secure some perimeters of data. Also IoT edge has gained a lot of momentum in both research and deployment as only means for practical IoT implementation. 5G is also promising to transform the business of IoT. This has led to an unprecedented large swath of new areas of research funding in IoT.
However large scale adaptation of IoT is slow due to security concerns at various levels. Securing Firmware and Gateways is far from ideal. One of the major issue is, disagreement among different large IoT vendors on the matter of security. Microsoft Azure, Amazon AWS have pushed forward with its own security standards. Where as NIST is placing a more comprehensive one. OWASP model of 10 layers of IoT security did some impact but overall failed to get much ground due to non-adoption from major IoT platform like Azure or Google.
Second large area of concern is security of Firmware. Primarily most of the Firmware are still vulnerable to any patching be it via OTA ( over the top ) or locally via a hardware port.
Course Objective
- Give introduction of all the technology stacks, data model and vulnerability of IoT
- Drawing the layers of vulnerability at each stack and between the stack
- Vulnerability from vendors and third party devices
- Learning about the NIST standard of IoT security
IoT (Internet of Things) - Technology Overview
7 HoursThe Internet of Things (IoT) is a concept in which everyday devices are connected to each other and to the Internet, which allows them to collect, exchange and analyze data. - IoT devices can be diverse: from smartphones, watches, medical devices, to cars, home appliances and industrial sensors. - These devices are connected using various technologies, such as Wi-Fi, Bluetooth, Zigbee, LTE and cellular networks, which enable them to communicate with each other and with Internet networks. - Equipped with sensors, IoT devices can collect data from the environment, e.g. temperature, humidity, geographical location, biometric data, etc. - The collected data is sent to the cloud or local data centers, where it is analyzed and processed into useful information. - Based on the collected data, devices can perform tasks automatically, e.g. regulate temperature, monitor health, control home systems, etc. - In industry, IoT can be used to monitor and optimize production processes, inventory management, monitor machine performance, etc. - In business IoT can help deliver services, personalize customer experiences, supply chain management, etc. - IoT is constantly evolving, integrating with artificial intelligence, machine learning and new technologies, which opens the door to new applications and innovations. The Internet of Things is changing the way we connect with the world, enabling us to monitor, control and optimize various aspects of our everyday lives, work and industry. Its development brings many new opportunities and challenges, especially related to security, privacy and data management.
Machine-to-Machine (M2M)
14 HoursMachine-to-Machine (M2M) refers to direct automated communication between networked mechanical or electronic devices.
NB-IoT for Developers
7 HoursIn this instructor-led, live training in Poland, participants will learn about the various aspects of NB-IoT (also known as LTE Cat NB1) as they develop and deploy a sample NB-IoT based application.
By the end of this training, participants will be able to:
- Identify the different components of NB-IoT and how to fit together to form an ecosystem.
- Understand and explain the security features built into NB-IoT devices.
- Develop a simple application to track NB-IoT devices.
Setting Up an IoT Gateway with ThingsBoard
35 HoursThingsBoard is an open source IoT platform that offers device management, data collection, processing and visualization for your IoT solution.
In this instructor-led, live training, participants will learn how to integrate ThingsBoard into their IoT solutions.
By the end of this training, participants will be able to:
- Install and configure ThingsBoard
- Understand the fundamentals of ThingsBoard features and architecture
- Build IoT applications with ThingsBoard
- Integrate ThingsBoard with Kafka for telemetry device data routing
- Integrate ThingsBoard with Apache Spark for data aggregation from multiple devices
Audience
- Software engineers
- Hardware engineers
- Developers
Format of the course
- Part lecture, part discussion, exercises and heavy hands-on practice
Note
- To request a customized training for this course, please contact us to arrange.