Get in Touch

Course Outline

Overview of Machine-to-Machine (M2M) Communications

  • Understanding the fundamentals of M2M
  • Introduction to M2M communication frameworks
  • Differentiating telemetry from M2M communications
  • Key applications of M2M technology
  • Interplay among people, processes, devices, networks, and applications

M2M Business Sectors

  • Automotive industry
  • Consumer electronics
  • Emergency services
  • Fleet and asset management
  • Healthcare
  • Manufacturing
  • Remote maintenance and control
  • Smart grid infrastructure
  • Smart home ecosystems
  • Opportunities for cellular vendors and service providers
  • Market trends and opportunities for embedded modules

M2M Ecosystem and Technologies Behind Smart and Intelligent Devices

  • Automation, asset management, telemetry, transportation telematics, healthcare, retail solutions, pricing mechanisms, and vending machines
  • Telemetry and telemetry-based systems
  • Location reporting, engine management data, logistics tracking, and remote assistance
  • Next-generation kiosks and self-service technologies
  • Sectors including entertainment, finance, government, retail, and transportation
  • M2M applications for MVNOs and connectivity service providers
  • Cellular-enabled vehicles, POS terminals, ATMs, and vending machines
  • Advanced M2M metering infrastructure
  • Digital signage market

M2M Applications

  • M2M vertical markets
  • M2M hosted services
  • M2M application development
  • M2M connectivity solutions
  • Global M2M service providers
  • M2M component and solution providers
  • M2M software providers
  • M2M hosted services
  • M2M networks
  • M2M machine controllers
  • M2M challenges
  • M2M devices
  • Wireless communication architectures and solutions

M2M Communications Technologies

  • Wireless Sensor Networking (WSN)
  • Cellular machine-to-machine (M2M) applications, networks, and air interface standards
  • Software for M2M applications
  • M2M communication protocols
  • Implementing security and encryption measures
  • Hardware and Real-Time Operating Systems (RTOS)
  • System-level flexibility
  • Utilizing communications protocols for Internet connectivity
  • IP-based cellular networks

M2M Systems and Networks

  • RF and wireless sensors
  • Wireless networks
  • Mobile Broadband Networks
  • Internet-connected computers
  • Robust processing performance
  • Networked devices
  • Device configurations and management
  • Real-time information exchange without human intervention

M2M and Networking Technologies

  • Cellular M2M connectivity services
  • Overview of cellular networks including GSM, CDMA, EV-DO, UMTS/HSPA/HSPA+, LTE, LTE-Advanced
  • Overview of SIM (Subscriber Identity Module), mini SIM, and embedded SIM cards
  • Overview of RFID, NFC, Zigbee, Bluetooth, WiFi, and WiMAX
  • Overview of Satellite Communications, VSAT, Microwave, and power line communication

M2M Design and Systems Engineering

  • M2M requirements
  • Hardware and software integration
  • M2M sensors
  • Tagging and tracking systems
  • Embedded products
  • M2M design principles
  • M2M SDKs
  • (U)SIM Card Technology
  • M2M connectivity and management
  • M2M Security
  • Open M2M initiatives
  • RF concepts behind cell planning and coverage

M2M Security

  • Security and trust frameworks for M2M communications
  • Secure communication within the context of M2M
  • M2M security framework
  • Securing Data input/output and Internet communication
  • Secure cryptographic libraries
  • RSA 1024- and 2048-bit private key encryption
  • AES-128/192/256
  • ARC4, MD5, and SHA-1
  • SSL
  • HTTPS
  • SIPS
  • Hardware redesign for enhanced security
  • Secure IP communication controller chips
  • Security threats for M2M
  • Machine Communication Identity Module (MCIM)
  • Configuration Attacks
  • Protocol Attacks on the Device
  • Attacks on the Core Network
  • User Data and Identity Privacy Attacks
 14 Hours

Number of participants


Price per participant

Testimonials (3)

Upcoming Courses

Related Categories