IOT

IoT Decision Maker (Academic Year 2018/2019)

IoT Decision Maker



Video professors: Sergio Martin - Universidad Nacional de Educación a Distancia (Madrid - Spagna), Rosario Gil - Universidad Nacional de Educación a Distancia (Madrid - Spagna), Romeo Beccherelli - Università Telematica Internazionale UNINETTUNO (Roma - Italia), Manfred Leisenberg - Fachhochschule des Mittelstands (Bielefeld - Germania), Beatriz Martin - Universidad Nacional de Educación a Distancia (Madrid - Spagna)

Videolesson

Lesson n. 1: Module 1: Introduction to Internet of Things - Part I
   Introduction to IoT

   Architectures

   Tools for devices
Go to this videolesson Romeo Beccherelli
Lesson n. 2: Module 1: Introduction to Internet of Things - Part II
   Devices: Sensors

   Devices: Actuators

   Devices: Microprocessors

   Devices: Microcontrollers

   Devices: Platforms

   Case Study: Cargotec and Cloudera
Go to this videolesson Romeo Beccherelli
Lesson n. 3: Module 2: IoT Business Strategy - Part I
   Introduction

   Creation of value with IoT: Introduction

   Creation of value with IoT: Creation of value
Go to this videolesson Manfred Leisenberg
Lesson n. 4: Module 2: IoT Business Strategy - Part II
   Creation of value with IoT: Make products better

   Creation of value with IoT: Operate products better

   Creation of value with IoT: Better product service

   Creation of value with IoT: Make new products
Go to this videolesson Manfred Leisenberg
Lesson n. 5: Module 2: IoT Business Strategy - Part III
   Monetize value with IoT: Introduction

   Monetize value with IoT: Product business model

   Monetize value with IoT: Product-service business model

   Monetize value with IoT: Service business model

   Monetize value with IoT: Service-outcome business model

   Monetize value with IoT: Outcome business model
Go to this videolesson Manfred Leisenberg
Lesson n. 6: Module 2: IoT Business Strategy - Part IV
   Customer Relationship: Introduction

   Customer Relationship: Transformation of Customer relation

   Customer Relationship: Lifetime Value

   Customer Relationship: Conclusion
Go to this videolesson Manfred Leisenberg
Lesson n. 7: Module 3: Overview of data analysis - Part I
   Introduction

   Focus on Big Data in IoT
Go to this videolesson Manfred Leisenberg
Lesson n. 8: Module 3: Overview of data analysis - Part II
   Role of analytics in IoT context

   Use-Cases: Scenario Consumer IoT

   Use-Cases: Scenario Smart Home
Go to this videolesson Manfred Leisenberg
Lesson n. 9: Module 3: Overview of data analysis - Part III
   Use-Cases: Scenario Smart Home

   Networked consumer electronics

   Safety and security

   Summary
Go to this videolesson Manfred Leisenberg
Lesson n. 10: Module 3: Overview of data analysis - Part IV
   Arificial Intelligence in IoT: frameworks, tools, technologies

   Machine Learning

   Big Data Analytic and Deep Learning

   The combination of AI and IoT: Summary
Go to this videolesson Manfred Leisenberg
Lesson n. 11: Module 4: Legal aspects of IoT from the business side - Part I
   European legislation

   Intellectual property protection

   Intellectual property protection: Copyright

   Intellectual property protection: Patents

   Intellectual property protection: Trade secrets

   Intellectual property protection: Open Source Software
Go to this videolesson Romeo Beccherelli
Lesson n. 12: Module 4: Legal aspects of IoT from the business side - Part II
   IoT interoperability

   Protection of the user provacy and protection

   Vulnerability

   European legislation

   Safety of IoT
Go to this videolesson Romeo Beccherelli
Lesson n. 13: Module 5: Networking for IoT environments - Introduction to Networking for IoT environments
   Introduction

   OSI Model

   TPC/IP Model

   Conclusions
Go to this videolesson Beatriz Martin
Lesson n. 14: Module 5: Networking for IoT environments - Connectivity technologies for IoT environments
   Connectivity

   Wired connectivity

   Wireless connectivity

   Conclusions
Go to this videolesson Beatriz Martin
Lesson n. 15: Module 5: Introduction to IoT security
   Introduction to Information security

   Threats

   Vulnerabilities

   Security needs

   Conclusions
Go to this videolesson Sergio Martin
Lesson n. 16: Module 5: Hardware vulnerabilities
   Introduction

   Hardware manipulation

   Vulnerabilities within the device

   Vulnerabilities in the Hardware

   Good prectices
Go to this videolesson Sergio Martin
Lesson n. 17: Module 5: Software vulnerabilities
   Scanning

   Packet sniffing

   Spoofing IP and ARP

   Denial of Service (DOS)

   Example: Mirai Botnet

   Conclusions
Go to this videolesson Rosario Gil