Skip to content

Contact sales

By filling out this form and clicking submit, you acknowledge our privacy policy.

Working with Edge and Internet of Things (IoT)

Course Summary

The Working with Edge and Internet of Things training course is designed to help students improve the customer experience. Through a combination of instruction and hands-on exercises, students will explore foundational concepts.

The course begins by diving into key concepts and challenges that a customer might face in the delivery of an Edge/Internet of Things (IoT) business solution. Next, students explore these topics from both a general perspective and in the context of specific technologies available. The course concludes with a hack-a-thon to help students reinforce those concepts through hands-on practice.

Purpose
Learn Edge/IoT concepts, including integration across multiple device types and data aggregation patterns, device management, and end-to-end security.
Audience
The ideal student will have introductory exposure to IoT device management.
Role
Software Developer - System Administrator
Skill Level
Introduction
Style
Workshops
Duration
3 Days
Related Technologies
Android | iOS

 

Productivity Objectives
  • Describe foundational Edge/IoT concepts
  • Understand how Edge/IoT strategies enable delivery of critical business systems
  • Associate specific technologies to Edge/IoT integration use cases
  • Identify potential technical challenges encountered when building out an Edge/IoT solution and explore options for remediating

What You'll Learn:

In the Working with Edge and Internet of Things (IoT) training course, you'll learn:
  • Edge/IoT - High-Level Introduction
  • Device Management
    • Device Registration
    • Device Connectivity
    • Device Status & Continuity
    • Device Eviction
  • Data Management
    • Data Ingestion
    • Data Aggregation
    • Data Scrubbing & Normalization
    • Gaining Intelligence from the Data
    • Monitoring vs. Control
  • Security and Compliance
    • Compliance with Industry Standards
    • Security at the Edge
    • Security at the Device
    • Security of Data at Rest
    • Security of Data in Motion
  • Operations
    • Performance at Scale
    • Coexistence of Many "Things"
    • Data Visualization & Dashboarding
    • Absorbing Ongoing Enhancements - Protocols, Devices, Software, and Hardware
  • Product/Technology Alignment
  • Hackathon - End-to-end data ingestion solution (device, Edge, cloud, ML/AI and mobile visualization)
  • Hackathon - Team Review
    • Lessons Learned
    • Solution AlternativesPros & Cons
“I appreciated the instructor's technique of writing live code examples rather than using fixed slide decks to present the material.”

VMware

Dive in and learn more

When transforming your workforce, it's important to have expert advice and tailored solutions. We can help. Tell us your unique needs and we'll explore ways to address them.

Let's chat

By filling out this form and clicking submit, you acknowledge our privacy policy.