Get in Touch

Course Outline

Overview of Machine-to-Machine (M2M) Communications

  • Understanding M2M
  • Introduction to M2M Communications
  • Distinctions Between Telemetry and M2M Communications
  • Real-World Applications of M2M
  • The Roles of People, Processes, Devices, Networks, and Applications

Key Business Sectors for M2M

  • Automotive Industry
  • Consumer Electronics
  • Emergency Services
  • Fleet and Asset Management
  • Healthcare Sector
  • Manufacturing
  • Remote Maintenance and Control
  • Smart Grid Infrastructure
  • Smart Home Solutions
  • Opportunities for Cellular Vendors and Service Providers
  • Market Trends and Opportunities for Embedded Modules

M2M Ecosystem and Technologies Powering Smart and Intelligent Devices

  • Applications in automation, asset management, telemetry, transportation telematics, healthcare, retail, pricing systems, and vending machines
  • Telemetry versus telemetric data
  • Reporting location, engine diagnostics, logistics tracking, and remote assistance
  • Next-generation kiosks and self-service technologies
  • Sectors including entertainment, finance, government, retail, and transportation
  • M2M solutions for MVNOs and connectivity service providers
  • Cellular-enabled vehicles, POS terminals, ATMs, and vending machines
  • Advanced metering infrastructure for M2M
  • Digital signage market dynamics

M2M Application Landscape

  • M2M Vertical Markets
  • Hosted M2M Services
  • M2M Application Development
  • M2M Connectivity Solutions
  • Global M2M Service Providers
  • M2M Component and Solution Vendors
  • M2M Software Providers
  • Hosted M2M Services
  • M2M Network Infrastructure
  • M2M Machine Controllers
  • Challenges in M2M Deployment
  • M2M Device Technologies
  • Wireless Communication Architectures and Solutions

M2M Communications Technologies

  • Wireless Sensor Networking (WSN)
  • Cellular M2M Applications, Networks, and Air Interface Standards
  • Software Supporting M2M Applications
  • M2M Communication Protocols
  • Implementing Security and Encryption Measures
  • Hardware and Real-Time Operating Systems (RTOS)
  • System-Level Flexibility
  • Utilizing Communication Protocols for Internet Connectivity
  • IP-Based Cellular Networks

M2M Systems and Networks

  • RF and Wireless Sensors
  • Wireless Network Infrastructures
  • Mobile Broadband Networks
  • Internet-Connected Computers
  • Robust Processing Performance
  • Networked Device Ecosystems
  • Device Configuration and Management
  • Real-Time Information Exchange Without Human Intervention

M2M and Networking Technologies

  • Cellular M2M Connectivity Services
  • Overview of Cellular Networks: GSM, CDMA, EV-DO, UMTS/HSPA/HSPA+, LTE, LTE-Advanced
  • Overview of SIM (Subscriber Identity Module) Technologies: Standard, Mini SIM, and Embedded SIM Cards
  • Overview of Short-Range Technologies: RFID, NFC, Zigbee, Bluetooth, WiFi, and WiMAX
  • Overview of Long-Range Technologies: Satellite Communications, VSAT, Microwave, and Power Line Communication

M2M Design and Systems Engineering

  • M2M System Requirements
  • Hardware and Software Integration
  • M2M Sensors
  • Tagging and Tracking Mechanisms
  • Embedded Products
  • M2M Design Principles
  • M2M Software Development Kits (SDK)
  • (U)SIM Card Technology
  • M2M Connectivity and Management
  • M2M Security Frameworks
  • Open M2M Initiatives
  • RF Concepts in Cell Planning and Coverage

M2M Security

  • Security and Trust Models for M2M Communications
  • Secure Communication within the M2M Context
  • M2M Security Frameworks
  • Securing Data Input/Output and Internet Communication
  • Secure Cryptographic Libraries
  • RSA 1024- and 2048-bit Private Key Encryption
  • AES-128/192/256 Encryption Standards
  • ARC4, MD5, and SHA-1 Algorithms
  • Secure Sockets Layer (SSL)
  • HTTPS Protocol
  • SIPS Protocol
  • Hardware Redesign for Enhanced Security
  • Secure IP Communication Controller Chips
  • M2M Security Threat Landscape
  • Machine Communication Identity Module (MCIM)
  • Configuration Attacks
  • Protocol Attacks Targeting Devices
  • Attacks on Core Network Infrastructure
  • User Data and Identity Privacy Attacks
 14 Hours

Number of participants


Price per participant

Testimonials (3)

Upcoming Courses

Related Categories