Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Overview of Machine-to-Machine (M2M) Communications
- Understanding M2M
- Introduction to M2M Communications
- Distinctions Between Telemetry and M2M Communications
- Real-World Applications of M2M
- The Roles of People, Processes, Devices, Networks, and Applications
Key Business Sectors for M2M
- Automotive Industry
- Consumer Electronics
- Emergency Services
- Fleet and Asset Management
- Healthcare Sector
- Manufacturing
- Remote Maintenance and Control
- Smart Grid Infrastructure
- Smart Home Solutions
- Opportunities for Cellular Vendors and Service Providers
- Market Trends and Opportunities for Embedded Modules
M2M Ecosystem and Technologies Powering Smart and Intelligent Devices
- Applications in automation, asset management, telemetry, transportation telematics, healthcare, retail, pricing systems, and vending machines
- Telemetry versus telemetric data
- Reporting location, engine diagnostics, logistics tracking, and remote assistance
- Next-generation kiosks and self-service technologies
- Sectors including entertainment, finance, government, retail, and transportation
- M2M solutions for MVNOs and connectivity service providers
- Cellular-enabled vehicles, POS terminals, ATMs, and vending machines
- Advanced metering infrastructure for M2M
- Digital signage market dynamics
M2M Application Landscape
- M2M Vertical Markets
- Hosted M2M Services
- M2M Application Development
- M2M Connectivity Solutions
- Global M2M Service Providers
- M2M Component and Solution Vendors
- M2M Software Providers
- Hosted M2M Services
- M2M Network Infrastructure
- M2M Machine Controllers
- Challenges in M2M Deployment
- M2M Device Technologies
- Wireless Communication Architectures and Solutions
M2M Communications Technologies
- Wireless Sensor Networking (WSN)
- Cellular M2M Applications, Networks, and Air Interface Standards
- Software Supporting M2M Applications
- M2M Communication Protocols
- Implementing Security and Encryption Measures
- Hardware and Real-Time Operating Systems (RTOS)
- System-Level Flexibility
- Utilizing Communication Protocols for Internet Connectivity
- IP-Based Cellular Networks
M2M Systems and Networks
- RF and Wireless Sensors
- Wireless Network Infrastructures
- Mobile Broadband Networks
- Internet-Connected Computers
- Robust Processing Performance
- Networked Device Ecosystems
- Device Configuration and Management
- Real-Time Information Exchange Without Human Intervention
M2M and Networking Technologies
- Cellular M2M Connectivity Services
- Overview of Cellular Networks: GSM, CDMA, EV-DO, UMTS/HSPA/HSPA+, LTE, LTE-Advanced
- Overview of SIM (Subscriber Identity Module) Technologies: Standard, Mini SIM, and Embedded SIM Cards
- Overview of Short-Range Technologies: RFID, NFC, Zigbee, Bluetooth, WiFi, and WiMAX
- Overview of Long-Range Technologies: Satellite Communications, VSAT, Microwave, and Power Line Communication
M2M Design and Systems Engineering
- M2M System Requirements
- Hardware and Software Integration
- M2M Sensors
- Tagging and Tracking Mechanisms
- Embedded Products
- M2M Design Principles
- M2M Software Development Kits (SDK)
- (U)SIM Card Technology
- M2M Connectivity and Management
- M2M Security Frameworks
- Open M2M Initiatives
- RF Concepts in Cell Planning and Coverage
M2M Security
- Security and Trust Models for M2M Communications
- Secure Communication within the M2M Context
- M2M Security Frameworks
- Securing Data Input/Output and Internet Communication
- Secure Cryptographic Libraries
- RSA 1024- and 2048-bit Private Key Encryption
- AES-128/192/256 Encryption Standards
- ARC4, MD5, and SHA-1 Algorithms
- Secure Sockets Layer (SSL)
- HTTPS Protocol
- SIPS Protocol
- Hardware Redesign for Enhanced Security
- Secure IP Communication Controller Chips
- M2M Security Threat Landscape
- Machine Communication Identity Module (MCIM)
- Configuration Attacks
- Protocol Attacks Targeting Devices
- Attacks on Core Network Infrastructure
- User Data and Identity Privacy Attacks
14 Hours
Testimonials (3)
The ability of the trainer to align the course with the requirements of the organization other than just providing the course for the sake of delivering it.
Masilonyane - Revenue Services Lesotho
Course - Big Data Business Intelligence for Govt. Agencies
The oral skills and human side of the trainer (Augustin).
Jeremy Chicon - TE Connectivity
Course - NB-IoT for Developers
I enjoyed the relaxed mood. Also there was a very good balance between theoretical presentation and practical side.