ECEA 5385 Industrial IoT Markets and Security
1st course in the Industrial IoT Markets and Security.
Instructor: David Sluiter, BSEE, Lecturer
Prior knowledge needed: Experience with technical writing, foundational knowledge and experience in embedded systems architecture, C programming, knowledge of digital logic analyzers and protocol analyzers
Learning Outcomes
- What Industry 4.0 is and what factors have enabled the IIoT.
- Key skills to develop to be employed in the IIoT space.
- What platforms are, and also market information on Software and Services.
- What the top application areas are (examples include manufacturing and oil &gas).
- What the top operating systems are that are used in IIoT deployments.
- About networking and wireless communication protocols used in IIoT deployments.
- About computer security; encryption techniques and secure methods for insuring data integrity and authentication.
Syllabus
Duration: 3 hours
In this module, you will see a specialization (full course) overview, learn what Industry 4.0 is all about, learn about the enabling factors that made it possible for the IIoT to come into existence, and become aware of what key skills to learn in order to be employed in the IIoT market segment.
Duration: 2 hours
In this module, we will take a look at what a platform is and the leading suppliers of platforms. The instructor will give you a quick look at an example building automation deployment and how a platform forms the "glue" that ties the entire system together. We will also take a look at the software and services market.
Duration: 2 hours
In this module, we will look at the top 5 application areas and considerations involved in selecting a real-time operating system for an IIoT node (think: a single board computer attached to a manufacturing machine like a lathe).
Duration: 2 hours
In this module we look at networking concepts and two important developments: Network Functions Virtualization and Software Defined Networks. We then move on to take a quick survey of long-range and short-range wireless protocols.
Duration: 14 hours
With billions of devices connected to the internet, security is of paramount importance. The instructor will share with you the bulk of his experience in developing security solutions for end-node type devices, focussing on hard drives and solid-state drives. However, the principles that "work" for storage devices also apply to any IIoT device. We'll have a guest speaker (Don Matthews) come in to talk to you about his experience with security which he has been doing for 25+ years.
Duration: 1 hour
The final exam for this module is based on the lecture content only.
To learn about ProctorU's exam proctoring, system test links, and privacy policy, visit www.colorado.edu/ecee/online-masters/current-students/proctoru.
Grading
Assignment | Percentage of Grade |
Quiz 1 | 10% |
Quiz 2 | 10% |
Quiz 3 | 10% |
Quiz 4 | 10% |
Quiz 5 | 10% |
Write a paper on security | 10% |
Final Exam | 40% |
Letter Grade Rubric
Letter Grade | Minimum Percentage |
A | 94% |
A- | 90% |
B+ | 87% |
B | 84% |
B- | 80% |
C+ | 77% |
C | 74% |
C- | 70% |
F | 0% |