Machine-to-Machine (M2M) Training
Commitment | 2 Days, 7-8 hours a day. |
Language | English |
User Ratings | Average User Rating 4.8 See what learners said |
Price | REQUEST |
Delivery Options | Instructor-Led Onsite, Online, and Classroom Live |
COURSE OVERVIEW
Machine-to-Machine (M2M) Training: This Machine-to-Machine Communications and Machine Learning Training (M2M) undertakes a detailed study of M2M (Machine-to-Machine) Communications including its drivers and benefits, business trends, relationship with Machine Learning and the IoT (Internet of Things), Machine Learning algorithms, M2M standardization efforts, M2M ecosystem and applications, M2M network infrastructure technologies, M2M network planning and implementation, M2M over Wireless Optical, and other key topics.
WHAT'S INCLUDED?
- 4 days of Machine-to-Machine (M2M) Training with an expert instructor
- Machine-to-Machine (M2M) Electronic Course Guide
- Certificate of Completion
- 100% Satisfaction Guarantee
RESOURCES
- Machine-to-Machine (M2M) Training – https://www.wiley.com/
- Machine-to-Machine (M2M) Training – https://www.packtpub.com/
- Machine-to-Machine (M2M) – https://store.logicaloperations.com/
- Machine-to-Machine (M2M) Training – https://us.artechhouse.com/
- Machine-to-Machine (M2M) Training – https://www.amazon.com/
RELATED COURSES
- 5G Wireless Security Training
- 5G Wireless Comprehensive Technical Overview Training
- mmW Technology Training | Millimeter Wave Training
- Internet of Things (IoT) Training In-depth
- Internet of Things: IoT Training Workshop
- LTE-M and NB-IoT Training Workshop
- The Internet of Things (IoT) Training Overview
ADDITIONAL INFORMATION
CUSTOMIZE IT
- We can adapt this Machine-to-Machine (M2M) Training course to your group’s background and work requirements at little to no added cost.
- If you are familiar with some aspects of this Machine-to-Machine (M2M) Training course, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the Machine-to-Machine (M2M) Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Machine-to-Machine (M2M) Training course in a manner understandable to lay audiences.
COURSE OBJECTIVES
Upon completing this Machine-to-Machine (M2M) Training course, learners will be able to meet these objectives:
AUDIENCE/TARGET GROUP
The target audience for this Machine-to-Machine (M2M) Training course:
- This M2M is for technical professionals who need to understand the technology and applications of M2M Communications and Machine Learning.
CLASS PREREQUISITES
The knowledge and skills that a learner must have before attending this Machine-to-Machine (M2M) Training course are:
- Understanding of networking, wireless, and Internet technologies.
COURSE SYLLABUS
Overview of M2M
- Overview of M2M Applications, Services, and Architecture
- M2M Definitions
- Overview of Embedded systems used in M2
- Overview of M2M IT Backend Systems
- M2M vs. IoT
- Machine-to-Machine Communications for Home
- Energy Management System in Smart Grid
- Smart Grid Solutions
- Distributed Energy Resources
- Generation
- Renewable
- Distribution
- Utilities
- Data Concentrator
- Aggregators: WAN, NAN, HAN
- Energy Gateway
- Neighborhood area network (NAN)
- Home area network (HAN)
- Machine-to-Machine Communications for Home
- Energy Management System in Smart Grid
- Home energy management system (HEMS) in smart grid
- Lab 1: Develop an M2M business case
- Machine-to-Machine (M2M) Training
M2M and Networking/Mobility
- Machine-to-Machine communications
- RF and wireless fundamentals
- Overview of wireless communications systems: RFID, Near Field Communications (NFC), ZigBee, Bluetooth, WiFi, WiMAX, Satellite Communications, VSAT, and Cellular
- Details of Cellular Networks: GSM, C2K EV-DO, UMTS/HSPA/HSPA+, LTE, LTE-Advanced
- Core IP networking and M2M
M2M service layer, APIs, and protocols overview
- Overview of M2M protocols
- Component-based M2M reference model
- M2M service layer
- M2M Platforms
- Reference points of the M2M service layer
- APIs and protocols for M2M
- ITU-T’s M2M API overview
- The design approach for M2M service layer APIs
- Other APIs and protocols for the M2M service layer
- M2M protocol structure and stacks
M2M Architecture and Vertical Case Studies
- M2M protocols
- What is Smart M2M?
- Interoperability Test Specification for ETSI M2M
- ETSI’s mIa, dIa, and mId interfaces
- Interworking between the M2M Architecture and M2M Area Network technologies
- M2M Functional architecture
- Interoperability Test Specification for CoAP Binding of ETSI M2M Primitives
- Machine to Machine communications (M2M); Use cases of Automotive Applications in M2M capable networks
- BBF TR-069 compatible Management Objects for ETSI M2M
- OMA DM compatible Management Objects for ETSI M2M
- Applicability of M2M architecture to Smart Grid Networks; Impact of Smart Grids on M2M platform
- Machine to Machine (M2M); Threat analysis and countermeasures to M2M service layer
- Smart Metering Use Cases
- ETSI Use Cases of M2M applications for eHealth
- ETSI Use Cases of M2M applications for Connected Consumer
M2M Project Management, Operation
- M2M project requirements
- M2M solution design and development
- M2M implementation
- M2M operations and management
- M2M SLA
- M2M OSS/BSS
- Network fault reporting and escalation
- Machine-to-Machine (M2M) Training
M2M Security
- M2M security
- Security and trust for M2M communications
- M2m security framework
- M2M security measures
- Passive, reactive, and active security measures for wireless M2M solutions.
- M2M access and core security
- M2M security protocols and architecture
- Engineering of end-to-end security architecture
- Embedded MIMs (Machine Identification Modules)
- Attacks on our connected machines
- Security threats for M2M
- Examples of security vulnerabilities
- Physical attacks
- Compromise of Credentials comprising a brute force
- Attacks on tokens and (weak) authentication algorithms
- Physical intrusion
- Side-channel attacks
- Malicious cloning of authentication tokens
- Attacks on Machine Communication Identity Module (MCIM)
- Configuration Attacks such as fraudulent software update/configuration changes
- Protocol attacks on the device
- man-in-the-middle attacks upon first network access
- Denial-of-service (DoS) attacks
- Attacks on the access and core networks
- traffic tunneling between impersonated devices
- misconfiguration of the firewall in the modem/router/gateways
- DoS attacks against the core network
- Attacks on the radio access network, using a rogue device.
- User Data and Identity Privacy Attacks i
- Eavesdropping on wireless access networks
- Eavesdropping on BLE, ZigBee
- Eavesdropping on GSM. GPRS, UTRAN or EUTRAN
- Introduction of Trusted Environment
- Requirements, Functionality, and Interfaces