- Level Professional
- المدة 22 ساعات hours
- الطبع بواسطة University of Colorado Boulder
-
Offered by
عن
This course can also be taken for academic credit as ECEA 5385, part of CU Boulder's Master of Science in Electrical Engineering degree. Developing tomorrow's industrial infrastructure is a significant challenge. This course goes beyond the hype of consumer IoT to emphasize a much greater space for potential embedded system applications and growth: The Industrial Internet of Things (IIoT), also known as Industry 4.0. Cisco's CEO stated: "IoT overall is a $19 Trillion market. IIoT is a significant subset including digital oilfield, advanced manufacturing, power grid automation, and smart cities". This is part 1 of the specialization. The primary objective of this specialization is to closely examine emerging markets, technology trends, applications and skills required by engineering students, or working engineers, exploring career opportunities in the IIoT space. The structure of the course is intentionally wide and shallow: We will cover many topics, but will not go extremely deep into any one topic area, thereby providing a broad overview of the immense landscape of IIoT. There is one exception: We will study security in some depth as this is the most important topic for all "Internet of Things" product development. In this course students will learn : * What Industry 4.0 is and what factors have enabled the IIoT * Key skills to develop to be employed in the IIoT space * What platforms are, and also market information on Software and Services * What the top application areas are (examples include manufacturing and oil & gas) * What the top operating systems are that are used in IIoT deployments * About networking and wireless communication protocols used in IIoT deployments * About computer security; encryption techniques and secure methods for insuring data integrity and authenticationالوحدات
Course Introduction
1
Discussions
- Introduction Discussion Forum
1
Readings
- Access to Course Resources
Lectures
10
Videos
- Introduction
- Segment 1 - Full Course Overview
- Segment 2 - Full Course Overview (con't)
- Segment 3 - Industry 4.0
- Segment 4 - Enabling Factors
- Segment 5 - Business Considerations
- Segment 6 - Cyber-Physical Systems, Market Growth
- Segment 7 - Top Players, Market Dynamics
- Segment 8 - Energy Market Example
- Segment 9 - Key Skills to Develop
Quiz 1
1
Quiz
- Module 1 Quiz
Lectures
5
Videos
- Segment 1 - Overview of Platforms, Software and Services
- Segment 2 - Device, Application and Network Management
- Segment 3 - Example Deployment: Building Automation
- Segment 4 - Software Solutions
- Segment 5 - Services
Quiz 2
1
Quiz
- Module 2 Quiz
Lectures
6
Videos
- Segment 1 - Automotive and Transportation
- Segment 2 - Industrial (Manufacturing)
- Segment 3 - Building Automation
- Segment 4 - Oil & Gas
- Segment 5 - Agriculture
- Segment 6 - Real-time Operations Systems (RTOS)
Quiz 3
1
Quiz
- Module 3 Quiz
Lectures
17
Videos
- Segment 1 - Leading Network and ISP Providers
- Segment 2 - Network Terminology
- Segment 3 - Network Functions Virtualization
- Segment 4 - Software Defined Networks
- Segment 5 - Messaging Schemes
- Segment 6 - Long-range Wireless Protocols
- Segment 7 - LoRa WAN
- Segment 8 - Ingenu
- Segment 9 - Satellite Communications
- Segment 10 - Short-range Wireless Protocols
- Segment 11 - ANT+
- Segment 12 - WiFi
- Segment 13 - ZigBee
- Segment 14 - WHART
- Segment 15 - EnOcean
- Segment 16 - Z-Wave
- Segment 17 - NFC
Quiz 4
1
Quiz
- Module 4 Quiz
Coming up in Module 5
1
Readings
- Coming up in Module 5
Lectures
21
Videos
- Segment 1 - Introduction, The Security Mindset
- Segment 2 - Encryption Algorithms Part 1
- Segment 3 - Diffie-Hellman, Encryption Algorithms Part 2
- Segment 4 - Hash and MAC Functions
- Segment 5 - Secure Firmware Updates, Random Number Generation
- Segment 6 - Threat Vectors, Attacks: Man-in-the-midddle, Replay
- Segment 7 - Protection Methods, Side-Channel Attacks
- Segment 8 - Chain of Trust
- Segment 9 - Examples of Poor Security Implementations
- Segment 10 - Incidents in the News, Planning for Incidents
- Segment 11 - Web Browsers, Security Certificates
- Segment 12 - Blockchains
- Segment 13 - Don Matthews, Agenda, Use Standard Algorithms
- Segment 14 - Don Matthews, Attacks Part 1
- Segment 15 - Don Matthews, Attacks Part 2, Threat Model
- Segment 16 - Don Matthews, Wear & Tear
- Segment 17 - Don Matthews, More Attacks
- Segment 18 - Don Matthews, "Only we can do this"
- Segment 19 - Don Matthews, More on Attacks
- Segment 20 - Don Matthews, Unintended Consequences, Ethical Hacking
- Segment 21 - US Security Standards, Summary
Quiz 5
1
Quiz
- Module 5 Quiz
Writing Assignment
1
Peer Review
- Write a Paper on Security
Auto Summary
Dive into the expansive world of Industrial IoT (IIoT) with this professional course led by CU Boulder's expert instructor. Explore emerging markets, technology trends, and essential skills for Industry 4.0, focusing on areas like digital oilfields, advanced manufacturing, and smart cities. Gain deep insights into security, encryption, and data integrity crucial for IIoT product development. This broad yet comprehensive overview is perfect for engineering students and professionals seeking to advance their careers in the IIoT space. Enroll through Coursera with a Starter subscription and embark on this 1320-minute journey into the future of industrial infrastructure.

David Sluiter