ECEA 5385 Industrial IoT Markets and Security

1st course in the Industrial IoT Markets and Security​.

Instructor: David Sluiter, BSEE, Lecturer

Prior knowledge needed: Experience with technical writing, foundational knowledge and experience in embedded systems architecture, C programming, knowledge of digital logic analyzers and protocol analyzers

Learning Outcomes

  • What Industry 4.0 is and what factors have enabled the IIoT.
  • Key skills to develop to be employed in the IIoT space.
  • What platforms are, and also market information on Software and Services.
  • What the top application areas are (examples include manufacturing and oil &gas).
  • What the top operating systems are that are used in IIoT deployments.
  • About networking and wireless communication protocols used in IIoT deployments.
  • About computer security; encryption techniques and secure methods for insuring data integrity and authentication.

Syllabus

Duration: 3 hours

In this module, you will see a specialization (full course) overview, learn what Industry 4.0 is all about, learn about the enabling factors that made it possible for the IIoT to come into existence, and become aware of what key skills to learn in order to be employed in the IIoT market segment.

Duration: 2 hours

In this module, we will take a look at what a platform is and the leading suppliers of platforms. The instructor will give you a quick look at an example building automation deployment and how a platform forms the "glue" that ties the entire system together. We will also take a look at the software and services market.

Duration: 2 hours

In this module, we will look at the top 5 application areas and considerations involved in selecting a real-time operating system for an IIoT node (think: a single board computer attached to a manufacturing machine like a lathe).

Duration: 2 hours

In this module we look at networking concepts and two important developments: Network Functions Virtualization and Software Defined Networks. We then move on to take a quick survey of long-range and short-range wireless protocols.

Duration: 14 hours

With billions of devices connected to the internet, security is of paramount importance. The instructor will share with you the bulk of his experience in developing security solutions for end-node type devices, focussing on hard drives and solid-state drives. However, the principles that "work" for storage devices also apply to any IIoT device. We'll have a guest speaker (Don Matthews) come in to talk to you about his experience with security which he has been doing for 25+ years.

Duration: 1 hour

The final exam for this module is based on the lecture content only.

To learn about ProctorU's exam proctoring, system test links, and privacy policy, visit www.colorado.edu/ecee/online-masters/current-students/proctoru.

Grading

Assignment
Percentage of Grade

Q​uiz 1

10%

Q​uiz 2

10%

Q​uiz 3

10%

Q​uiz 4

10%

Q​uiz 5

10%

W​rite a paper on security

10%

Final Exam

40%

Letter Grade Rubric

Letter Grade 
Minimum Percentage

A

94%

A-

90%

B+

87%

B

84%

B-

80%

C+

77%

C

74%

C-

70%

F

0%