Edge Computing and IoT Integration Specialist
Course title: Exploring AWS IoT
Target group: Mid Level Employee
Level: Foundations
Exploring AWS IoT
Provider
Udemy
Description
This course explores the various features of device to cloud communication using Amazon AWS IoT Core on an AWS free tier account.
Before the course starts, we need an AWS free tier account, a local installation of the AWS CLI tool, and installation of the MQTT. fx testing tool (all free). After this is set up, we will program inexpensive, WiFi enabled embedded devices such as the ESP8266, ESP32, and Raspberry Pi to communicate with AWS IoT Core with MQTT.
We will take advantage of free “Internet of Things” (IoT) development environments, like Mongoose OS in JavaScript, Arduino in C, Zernyth in Python, AWS FreeRTOS in C, and the AWS IoT SDK in both JavaScript and Python for the Raspberry Pi to program our inexpensive WiFi devices.
You will need at least one or more of the following devices to transmit data to AWS IoT. Alternately, you can send JSON test payloads from IoT Core directly, imitating a IoT device. The course continues on with programming our embedded devices to send data from the device to the AWS cloud. To transmit our data, we will use the built in MQTT broker on our deviceās firmware, sending JSON encoded sensor data, to the AWS IoT console.
From within the IoT console we will create AWS IoT āRulesā and āActionsā to explore many of the built in AWS IoT enabled services that are integrated in the AWS IoT Core console on the AWS cloud. Creating rules-based actions to AWS services we will send, store, file, manipulate, graph and analyze our sensor data through a variety of important AWS applications. Some of these integrated applications, using these rule-based actions, are Dynamo Database, S3, SNS, Lambda, Data Pipeline, Glue, Quick Sight, AWS IoT Analytics, and SageMaker.
IoT is largely the fusion of devices and the web, specifically the cloud; all sending and recording data, ubiquitously and continually, everywhere. Understanding and being able to prototype and implement an end-to-end, device to cloud path communication is a much in demand career skill. Having the skills to build a prototyping IoT solution in the cloud is already an important and highly demanded skill set for those wanting to call themselves IoT developers, and this is truer as time goes on and IoT exponentially expands as cheap connected devices become wide-spread.
Target
- Aspiring IoT developers
- Electronics hobbyists and enthusiasts
- Embedded systems engineers
- Software developers interested in IoT
- Students and professionals seeking IoT cloud integration skills
- Tech professionals aiming to explore end-to-end IoT solutions
Sector
- Information Technology
- IoT and embedded systems development
- Cloud computing and data analytics
- Industrial automation
- Smart devices and home automation
- Technology startups and innovation hubs
Area
- Device-to-cloud communication
- IoT cloud application development
- AWS cloud services integration
- IoT sensor data management and analysis
- Embedded device programming and networking
Learning outcomes
- Program the ESP8266, ESP32, or Raspberry Pi 3 to send data to AWS IoT Core
- Connect to AWS free Tier and use relevant AWS services
- Understand MQTT, JSON, IoT, and the AWS cloud
- Become familiar with device to cloud communication
- Place IoT data into Dynamo DB by creating a table and data fields
- Gain competency designing graphs and using analytics on IoT data
- Code with basic programming structures in JavaScript, Python, and C
- Get experience with many AWS services vital to IoT like Lambda and S3
- Learn to Create Security certificates and policies in AWS IoT
Learning content
- Welcome to the course
- Setting up Free tier AWS, AWS CLI, Policys, Security Credentials, and Testing
- MQTTs Arduino sketch to AWS IoT Core for the ESP8266/ESP32
- HTTPs Arduino sketch to AWS IoT Core for the ESP8266 and ESP32
- MicroPython to AWS IoT Core using Thonny on the ESP32 and ESP8266
- Using Mongoose OS on embedded devices for AWS IoT
- Programming the ESP32 in Python with Zerynth (optional in 2022)
- Programming the Raspberry Pi with the AWS IoT Device SDK V2
- SNS Push Notifications
- S3 and data objects
- Using Kinesis Firehose for stroring timeframe defined data
- Storing IoT data into the Dynamo Database V2 from the AWS IoT Core
- Exporting our IoT data from DynamoDB v2 to S3
- Using AWS Quicksight for data visualizations of our IoT data from S3
- Bonus Section: AWS Lambda Functions for IoT
- Bonus Section: AWS IoT Analytics
- Bonus Section: AWS Device Shadows and multiple Pub/Sub’s
- Bonus Section: Timestream data ledger with Grafana visualizations
- Bonus Section: Amazon FreeRTOS for the ESP32
- Optional Material: Node-Red for AWS IoT Core
Approach/method
Online
Duration
7.5 hours on-demand video
Assessment
No
Certification
Yes
Cost
ā¬89.99
Provider contacts
Date
Always available
Location
Online
Website
Course title: Wireless Network Fundamentals
Target group: Junior (Fresh Employee)
Level: Awareness
Wireless Network Fundamentals
Provider
Udemy
Description
A wireless LAN (WLAN) is a wireless computer network that links two or more devices using wireless communication to form a local area network (LAN) within a limited area such as a home, school, computer laboratory, campus, or office building. This gives users the ability to move around within the area and remain connected to the network. Through a gateway, a WLAN can also provide a connection to the wider Internet.
Wireless LANs based on the IEEE 802.11 standards are the most widely used computer networks in the world. These are commonly called Wi-Fi, which is a trademark belonging to the Wi-Fi Alliance. They are used for home and small office networks that link together laptop computers, printers, smartphones, Web TVs and gaming devices with a wireless router, which links them to the internet. Hotspots provided by routers at restaurants, coffee shops, hotels, libraries, and airports allow consumers to access the internet with portable wireless devices.
The IEEE 802.11 has two basic modes of operation: infrastructure and ad hoc mode. In ad hoc mode, mobile units communicate directly peer-to-peer. In infrastructure mode, mobile units communicate through a wireless access point (WAP) that also serves as a bridge to other networks such as a local area network or the Internet. Since wireless communication uses a more open medium for communication in comparison to wired LANs, the 802.11 designers also included encryption mechanisms: Wired Equivalent Privacy (WEP), no longer considered secure, Wi-Fi Protected Access (WPA, WPA2, WPA3), to secure wireless computer networks. Many access points will also offer Wi-Fi Protected Setup, a quick, but no longer considered secure, method of joining a new device to an encrypted network.
Target
- Home users
- Small office workers
- IT professionals and network administrators
- Students and educators
- Hospitality and retail staff
Sector
- Information Technology and Networking
- Education
- Hospitality and Hospitality Services
- Retail
- Telecommunications
Area
- Home and Office Networking
- Educational Institutions (schools, universities)
- Public places (cafes, airports, hotels, libraries)
- Commercial and Retail Environments
- Campus and Small Business Networks
Learning outcomes
- RF Signals and Modulation
- RF Standards
- RF Signals in the Real World
- Understanding Antennas
- Wireless LAN Topologies
- Understanding 802.11 Frame Types
- Planning Coverage with Wireless APs
- Understanding Cisco Wireless Architectures
- Implementing Autonomous and Cloud Deployments
- Implementing Controller-based Deployments
- Understanding Controller Discovery
- Understanding Roaming
- Understanding RRM
- Wireless Security Fundamentals
- Configuring a WLAN
- Implementing a Wireless Guest Network
- Configuring Client Connectivity
- Managing Cisco Wireless Networks
- Dealing with Wireless Interference
- Troubleshooting WLAN Connectivity
Learning content
- RF Signals and Modulation
- RF Standards
- RF Signals in the Real World
- Understanding Antennas
- Wireless LAN Topologies
- Understanding 802.11 Frame Types
- Planning Coverage with Wireless APs
- Understanding Cisco Wireless Architectures
- Implementing Autonomous and Cloud Deployments
- Implementing Controller-based Deployments
- Understanding Controller Discovery
- Understanding Roaming
- Wireless Security Fundamentals
- Building a Wireless LAN
- Locating Devices in a Wireless Network
- Troubleshooting WLAN Connectivity
Approach/method
Online
Duration
22 hours on-demand video
Assessment
No
Certification
Yes
Cost
19.99ā¬
Provider contacts
Date
Always available
Location
Online
Website
Course title: Computer Networking – Wired and Wireless Networks and Protocols
Target group: Junior
Level: Awareness
Computer Networking – Wired and Wireless Networks and Protocols
Provider
Alison
Description
The course begins by introducing you to networking fundamentals. This will give you a better understanding of what wired and wireless networks are about. You will first learn the basics of both networks’ media, protocols, standards, and concepts. The course will then tackle cabling systems for wired networks, in particular, the twisted-pair cables. cables and signaling, and other types of cable. The course will then discuss Internet Protocol(IP) addresses in detail, including IP Ranges. You will look into the difference between the Internet Protocol V4 and Internet Protocol V6.The course will then teach you about the role of the Default gateway and DNS server in networking. You will also learn how to implement TCP/IP in the Command Line as well as discover and see TCP/IP tools used to manage and troubleshoot networks. Basic TCP/IP tools such as command prompt, ipconfig, and ping will also be taught and demonstrated. The course will also describe and demonstrate the function of advanced TCP/IP tools such as Netstat, Pathping, Nslookup, Telnet, NbtStat, and Netsh.Wired and Wireless network connections both have their advantages and disadvantages. Understanding these can make a big difference to your networks in terms of reliability and stability, speed, security, installation, maintenance, and cost.
Target
- Networking beginners
- IT professionals seeking foundational networking knowledge
- Technicians and network administrators
Sector
- Information Technology
- Telecommunication
Area
- Network fundamentals and protocols
- Wired and wireless network setup and management
- IP addressing and subnetting
- Network troubleshooting and tools
Learning outcomes
- Describe the structure and function of twisted-pair cable
- List cable speeds and the cable types
- Define the terms attenuation and interference in relation to networking
- Describe the structure and function of wireless networks
- Describe the structure of Internet Protocol addresses
- List the IP Ranges and their classes
- Describe the role of Default gateway and DNS server in networking
- Compare and contrast IPv4 versus IPv6 addresses
Learning content
- Module 1
Networking Fundamentals: Understanding Wired and Wireless Network - Module 2
Networking Fundamentals: Understanding Internet Protocol - Module 3
Networking Fundamentals: Implementing Tcp/ip in the Command - Module 4
- Course assessment
Approach/method
Online
Duration
1.5-3 Hours on average
Assessment
Yes
Certification
Yes
Cost
Free
Provider contacts
Date
Always available
Location
Online
Website
Course title: Edge Computing: Master the Next Frontier of Computing
Target group: Junior
Level: Awareness
Edge Computing: Master the Next Frontier of Computing
Provider
udemy
Description
Edge Computing: From Buzzword to Breakthrough
Unleash the power of data processing where it happens – at the edge of the network. In this comprehensive course, you’ll unlock the secrets of Edge Computing, the transformative technology powering faster, smarter, and more efficient operations across industries.
No prior knowledge needed! Whether you’re a tech leader, data scientist, IT pro, or simply curious about this future-forward trend, this course will equip you with everything you need to:
Shape the future:Ā Position yourself as an Edge Computing pioneer, ready to capitalize on this game-changing technology.
Master the fundamentals:Ā Understand what Edge Computing is, its key benefits, and how it redefines data processing.
Discover real-world potential:Ā Explore diverse use cases in banking, manufacturing, retail, healthcare, and beyond.
Tame the challenges:Ā Learn best practices for overcoming security, data management, and implementation hurdles.
Get hands-on:Ā Put your knowledge into action with practical labs and industry-standard tools.
Target
- Tech Enthusiasts: Curious about the next frontier of computing and its impact on various industries?
- Tech Professionals: Looking to expand your skillset and stay ahead of the curve in the ever-evolving tech landscape?
- Data Science Leaders: Seeking new ways to optimize data processing and unlock faster, real-time insights?
- IT Professionals: Eager to understand how Edge Computing can revolutionize network infrastructure and security?
- Business Leaders: Visionaries driven to identify and implement transformative technologies for a competitive edge?
Sector
Banking, manufacturing, retail, healthcare, and other industries
Area
Edge Computing, Data Processing, Industry-specific use cases
Learning outcomes
- Define Edge Computing & explain its core advantages like reduced latency and enhanced security.
- Identify potential use cases for Edge Computing across diverse industries like finance, manufacturing, and healthcare.
- Analyze the impact of Multi-access Edge Computing (MEC) and position yourself for the future of distributed processing.
- Position yourself as a thought leader in the Edge Computing space, gaining valuable skills for career advancement.
- Stay updated on emerging trends in Edge Computing, such as artificial intelligence and machine learning at the edge.
- Implement security best practices for protecting data and devices in an Edge Computing environment.
Learning content
- Introduction to Edge Computing
- Edge Computing: Challenges, Strategies and Best Practices
- Applications of Edge Computing
- Tools, Implementation & Multi-Access Edge Computing
- Edge Computing: Technologies, Vendors and Edge AI
- Project #1: Temperature Monitoring (Edge Computing in Healthcare Industry)
- Project #2: Vehicle Maintenance System (Edge Computing in Automobile Industry)
- Project #3: Production Line Monitoring System (Edge Computing in Manufacturing)
- #4: Inventory Management System (Edge Computing in Retail Industry)
Approach/method
Online
Duration
2 hours on-demand video
Assessment
Yes
Certification
Yes
Provider contacts
Date
Always available
Location
Online
Website
Course title: Cybersecurity Fundamentals Course
Target group: Junior
Level: Foundations
Cybersecurity Fundamentals Course
Provider
Cyberlab.securenetworks
Description
The Cybersecurity Fundamentals course provides a comprehensive introduction to the field, guiding students through essential topics such as the evolution and significance of cybersecurity. It covers foundational principles like the Confidentiality, Integrity, and Availability (CIA) Triad and examines common threats including malware and phishing. Students will explore critical defense mechanisms like firewalls and identity management, as well as emerging challenges in areas such as the Internet of Things (IoT) and cloud security. Throughout the course, learners will discover how to design secure networks, protect sensitive data, and effectively handle incidents using proper response strategies. The curriculum also includes compliance with key frameworks and regulations, ensuring a well-rounded understanding of the cybersecurity landscape. By the end, students will have gained foundational knowledge and practical skills through assessments and projects, empowering them to build robust cybersecurity defenses.
Target
- NEW IT/Tech students and career switchersĀ seeking foundational knowledge in cybersecurity
- Aspiring security professionalsĀ preparing for entry-level roles (e.g., Security Analyst, Cybersecurity Technician)
- Non-technical professionalsĀ needing a baseline understanding of cybersecurity concepts for risk and compliance roles
- Educators and trainersĀ seeking a foundational module to augment curricula
Sector
- Information Technology / Cybersecurity industry
- Business and enterprise IT departmentsĀ across various sectors (finance, healthcare, manufacturing, retail, government)
- Education and training sectorĀ (academic programs, professional development)
Area
- Foundations of cybersecurityĀ (evolution, significance)
- CIA TriadĀ (Confidentiality, Integrity, Availability)
- Threat landscapeĀ (malware, phishing)
- Defensive controlsĀ (firewalls, identity management, access control)
- Emerging challengesĀ (IoT security, cloud security)
- Secure network designĀ andĀ data protection
- Incident response and recovery
- Compliance and frameworks/regulationsĀ (risk management, standards)
- Practical applicationĀ (assessments and projects)
Learning outcomes
- Understand the Current Cybersecurity Landscape: Gain insights into the evolving field of cybersecurity and the importance of protecting information systems.
- Learn Linux Command Line Interface (CLI): Become comfortable with common Linux commands and utilities essential for cybersecurity tasks.
- Understand Data Communications Basics: Learn how to read and analyze network data and traffic, which is crucial for identifying potential security threats.
- Practice with Common Cybersecurity Tools: Use tools like netcat, nmap, and Wireshark to perform basic cybersecurity tasks and understand their applications in real-world scenarios
Learning content
- Module 1: Introduction to Cybersecurity
- Module 2: Core Principles of Cybersecurity
- Module 3: Types of Cyber Threats
- Module 4: Cyber Defense Mechanisms
- Module 5: Identity and Access Management (IAM)
- Module 6: Secure Network Design
- Module 7: Application Security
- Module 8: Data Security and Privacy
- Module 9: Incident Response and Management
- Module 10: Cybersecurity Compliance and Governance
- Module 11: Emerging Trends and Technologies
- Final Assessment and Practical Projects
Approach/method
Online
Duration
10ā12 hours
Assessment
Yes
Certification
Yes
Date
Always available
Location
Online
Website
Course title: Microsoft Azure API Management Essentials
Target group: Mid Level Employee
Level: Extended Know-How
Microsoft Azure API Management Essentials
Provider
Pluralsight
Description
This course demonstrates how to use Microsoft Azure API Management to quickly and securely enable APIs for mobile development and for internal and external use. Increasingly Application Programming Interfaces (APIs) are being referred to as the engines of growth and are fundamentally changing the way organizations do business. In this course, Microsoft Azure API Management Essentials, you’ll learn about using Azure API Management service to ensure that your current and future APIs can reach the fullest potential. First, you’ll learn why you should use API Management, and how to manage your API with Azure API Management. Next, you’ll learn how to protect your API with rate limits and how to add caching to improve API performance. Then, you’ll learn about policies in API Management and C# based Policy Expressions. Finally, you’ll learn about security in API Management. By the end of this course, you’ll have a solid understanding of Azure API Management, its key capabilities, and how to host and secure your API (internal and external).
Target
- IT professionals and developers responsible for designing, publishing, and securing APIs
- API publishers and product managers
- DevOps engineers and security engineers
- Developers building mobile and web applications that consume APIs
- IT operations and site reliability engineers (SRE)
- Solution architects and technical leads
- Developers working with Policy Expressions (C#) in API Management
- Security-focused developers and admins
- Performance engineers and testers
- Anyone involved in delivering APIs to internal/external consumers
Sector
- Technology/Software, Cloud services, Enterprise IT
- Enterprise IT, SaaS providers
- Financial services, healthcare, public sector, any API-reliant domain
- Mobile/Web development, SaaS, startups
- Corporate IT, cloud operations
- Enterprise architecture, cloud architecture
- Cloud platforms, developer tooling
- Regulated industries (finance, healthcare, public sector)
- Tech companies, services needing scalable APIs
- Cross-industry
Area
- API design, API governance, API security, and API optimization using Azure API Management
- API strategy, cataloging, versioning, and lifecycle management
- API security, rate limiting, caching, and policy implementation (Policy Expressions)
- Consuming secured APIs, performance improvements via caching, and access control
- API hosting, monitoring, and governance for internal and external APIs
- Architectural patterns for API management, lifecycle, and integration with Azure services
- Policy creation, customization, and behavior control of APIs within Azure API Management
- Security in API Management, threat mitigation, and compliant access policies
- Rate limiting, caching strategies, and performance tuning of APIs exposed via Azure API Management
Learning outcomes
- Understand the capabilities and organizational model of the Apigee API Platform.
- Design and deploy RESTful APIs using Apigee.
- Productize and publish APIs, turning them into consumable products for developers.
- Explain core API design principles, including REST fundamentals.
- Secure APIs using OAuth 2.0, JSON Web Tokens (JWT), and federated identity.
- Use Apigee terminology and concepts, such as API proxies, products, and developer portals.
- Practice hands-on by building and managing APIs directly in the Apigee environment.
Learning content
- Course Overview
- Understanding API Management
- Policies in Microsoft Azure API Management
- Security in API Management
Approach/method
Online
Duration
2 Hours
Assessment
No
Certification
No
Provider contacts
Date
Always available
Location
Online
Website
Course title: Masterclass Certificate in IoT Troubleshooting for Smart Monitoring
Target group: Mid Level Employee
Level: Extended Know-How
Masterclass Certificate in IoT Troubleshooting for Smart Monitoring
Provider
247campus
Description
IoT Troubleshooting for Smart Monitoring Masterclass Certificate in IoT Troubleshooting for Smart Monitoring is designed for IoT professionals and smart monitoring enthusiasts who want to master the art of identifying and resolving issues in IoT devices and systems. Learn how to analyze IoT device logs, identify patterns, and troubleshoot common issues such as connectivity problems, data inconsistencies, and system crashes. Develop your skills in smart monitoring and IoT device management to ensure the reliability and efficiency of your IoT systems. Take the first step towards becoming an expert in IoT troubleshooting and smart monitoring. Explore the Masterclass Certificate today and start solving IoT challenges!
Target
- IoT professionals
- Smart monitoring enthusiasts
- IoT device managers
- IT operations and support engineers (IoT-focused)
- IoT solution integrators and consultants
- Smart monitoring practitioners
- IoT security and reliability teams
- Product managers and developers in IoT projects
Sector
- Information Technology / IoT industry
- Technology and applied analytics
- Industrial automation and smart infrastructure
- IT operations / DevOps with IoT deployments
- Embedded systems integration / smart systems consulting
- Smart cities, smart buildings, and industrial IoT
- IoT security and reliability engineering
- Software/hardware product development for IoT
Area
- IoT device troubleshooting
- Smart monitoring
- IoT systems analysis
- Connectivity troubleshooting
- Data integrity and analytics
- System reliability and maintenance
- End-to-end troubleshooting workflows
- Monitoring strategy and performance optimization
- Log analysis and pattern recognition
- IoT device management
- Embedded systems integration
- Smart infrastructure management
- IT operations for IoT deployments
Learning outcomes
- Network Fundamentals for IoT Troubleshooting
- Device Management and Configuration
- Communication Protocols for IoT
- Data Analytics and Visualization for IoT
- Security and Privacy in IoT
- IoT Device Hacking and Vulnerability Assessment
- Cloud Computing for IoT
- Edge Computing for IoT
- IoT Troubleshooting Tools and Techniques
- Smart Monitoring System Design and Implementation
Learning content
- Module 1: Introduction to IoT Troubleshooting
- Module 2: IoT Device Logs and Data Analysis
- Module 3: Connectivity Issues and Network Troubleshooting
- Module 4: Data Inconsistencies and Device Errors
- Module 5: System Crashes and Performance Issue
- Module 6: Smart Monitoring Strategies
- Module 7: Case Studies and Hands-On Troubleshooting
Approach/method
Online
Duration
2-3 hours per week
Assessment
No
Certification
Yes
Cost
Free
Date
Always available
Location
Online
Website