Certified Internet of Things Practitioner (CIoTP™) Training Course
The Internet of Things (IoT) holds a broad spectrum of advantages for various sectors, including industry, energy and utility companies, municipalities, healthcare, and consumers. It enables the collection of vast amounts of detailed data on almost any measurable aspect, such as public health and safety, environmental conditions, industrial and agricultural production, and energy and utilities. Advanced data analysis tools have been tailored to handle the massive datasets generated by IoT, facilitating swift and well-informed decision-making.
However, implementing IoT systems can be a complex endeavor, fraught with challenges. Solutions often involve devices and technologies from multiple vendors, necessitating a solid understanding of both software and hardware integration, as well as awareness of the associated risks in security, privacy, and safety for those whose environments are managed by these systems.
IT professionals frequently lack experience with embedded systems, sensor networks, actuators, real-time systems, and other IoT components. This course provides a foundational understanding of how these elements interact with more familiar IT systems such as networks, cloud computing, and applications running on servers, desktops, and mobile devices.
In this course, students will explore general strategies for planning, designing, developing, implementing, and maintaining an IoT system through various case studies. They will also assemble and configure an IoT device to function within a sensor network. Students will build an IoT device using an ESP8266 microcontroller, incorporating features like analog and digital sensors, a web-based interface, MQTT messaging, and data encryption.
Course Objectives: In this course, you will learn how to leverage Internet of Things technologies to address real-world challenges. You will:
• Plan an IoT implementation.
• Construct and program an IoT device.
• Communicate with an IoT device using both wired and wireless connections.
• Process sensor input and control actuators on an IoT device.
• Manage security, privacy, and safety risks in IoT projects.
• Manage an IoT prototyping and development project throughout the entire lifecycle.
Target Student: This course is tailored for IT professionals who possess fundamental skills in computer hardware, software support, and development and are eager to learn how to design, develop, implement, operate, and manage Internet of Things devices and related systems. The student is interested in gaining knowledge about embedded systems, microcontroller programming, IoT security, and the development lifecycle for IoT projects.
While students will gain hands-on experience assembling a prototype IoT device and using software development tools, these activities are closely guided, so prior experience in electronics assembly and programming is not required. This course prepares students to take the CertNexus Certified Internet of Things (IoT) Practitioner (Exam ITP-110).
This course is available as onsite live training in Serbia or online live training.Course Outline
Lesson 1: Planning an IoT Implementation
- Topic A: Select a General Architecture for an IoT Project
- Topic B: Identify Benefits and Challenges of IoT
Lesson 2: Constructing and Programming an IoT Device
- Topic A: Select and Configure a Processing Unit
- Topic B: Select a Microcontroller Power Source
- Topic C: Use a Software Development Kit to Program an IoT Device
Lesson 3: Communicating with an IoT Device
- Topic A: Communicate Using Wired Connections
- Topic B: Communicate Using Wireless Connections
- Topic C: Communicate Using Internet Protocols
Lesson 4: Processing IoT Data
- Topic A: Process IoT Device Input and Output
- Topic B: Process Data in the Cloud
- Topic C: Provide Machine to Machine Communication
Lesson 5: Managing Risks on IoT Projects
- Topic A: Identify IoT Security and Privacy Risks
- Topic B: Manage IoT Security and Privacy Risks
- Topic C: Manage IoT Safety Risks
Lesson 6: Undertaking an IoT Project
- Topic A: Identify Real World Applications for IoT
- Topic B: Follow the IoT Development Lifecycle
Requirements
To ensure your success in this course you should be an experienced computer user who is comfortable setting up and configuring computers and electronic devices.
Open Training Courses require 5+ participants.
Certified Internet of Things Practitioner (CIoTP™) Training Course - Booking
Certified Internet of Things Practitioner (CIoTP™) Training Course - Enquiry
Certified Internet of Things Practitioner (CIoTP™) - Consultancy Enquiry
Upcoming Courses
Related Courses
CERTIFIED ETHICAL EMERGING TECHNOLOGIST (CEET)
21 HoursAdvances in computing and engineering are driving technological progress, from blockchain and AI to gene editing and IoT, offering opportunities for productivity and human well-being. Yet, these innovations also bring new risks, as recent scandals highlight. Technology professionals face increasing pressure to address ethical concerns, balancing privacy, accuracy, fairness, and safety. This course provides practical tools to manage ethical risks in emerging data-driven technologies, drawing from theory, regulations, and industry practices. Learners will gain skills to navigate ethical dilemmas in their roles and organizations.
CyberSec First Responder
35 HoursThis course covers network defense and incident response methods, tactics, and procedures, aligned with industry frameworks such as NIST 800-61 r.2 (Computer Security Incident Handling), US-CERT’s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy. It is designed for professionals tasked with monitoring and detecting security incidents in information systems and networks, as well as executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and remediate and report incidents as they occur. This comprehensive methodology is tailored for individuals responsible for defending their organization’s cybersecurity.
This course is designed to help students prepare for the CertNexus CyberSec First Responder (Exam CFR-310) certification examination. The knowledge and skills gained in this course can significantly contribute to your preparation. Additionally, this course and subsequent certification (CFR-310) meet all requirements for personnel requiring DoD directive 8570.01-M position certification baselines:
• CSSP Analyst
• CSSP Infrastructure Support
• CSSP Incident Responder
• CSSP Auditor
Course Objectives: In this course, you will gain a deep understanding of security threats and learn to operate a system and network security analysis platform. You will:
• Compare and contrast various threats and classify threat profiles
• Explain the purpose and use of attack tools and techniques
• Explain the purpose and use of post-exploitation tools and tactics
• Explain the purpose and use of social engineering tactics
• Given a scenario, perform ongoing threat landscape research and use data to prepare for incidents
• Explain the purpose and characteristics of various data sources
• Given a scenario, use appropriate tools to analyze logs
• Given a scenario, use regular expressions to parse log files and locate meaningful data
• Given a scenario, use Windows tools to analyze incidents
• Given a scenario, use Linux-based tools to analyze incidents
• Summarize methods and tools used for malware analysis
• Given a scenario, analyze common indicators of potential compromise
• Explain the importance of best practices in preparing for incident response
• Given a scenario, execute the incident response process
• Explain the importance of concepts unique to forensic analysis
• Explain general mitigation methods and devices
Target Student: This course is primarily designed for cybersecurity professionals preparing for or currently performing job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. It is ideal for roles within federal contracting companies and private sector firms whose mission or strategic objectives require the execution of Defensive Cyber Operations (DCO) or DoD Information Network (DODIN) operations and incident handling. This course focuses on the knowledge, ability, and skills necessary to defend information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes.
In addition, the course ensures that all members of an IT team—regardless of size, rank, or budget—understand their role in cyber defense, incident response, and incident handling.
Certified Artificial Intelligence (AI) Practitioner
35 HoursArtificial intelligence (AI) and machine learning (ML) have become indispensable tools for many organizations. When used effectively, these technologies provide valuable insights that drive critical decisions and enable the creation of innovative products and services. This course will guide you through applying various approaches and algorithms to solve business problems using AI and ML, following a systematic workflow to develop robust solutions, utilizing open-source tools to build, test, and deploy those solutions, and ensuring user privacy is protected. The course includes practical activities for each topic area.
Course Objectives: In this course, you will learn how to implement AI techniques to address business challenges. You will:
- Define a general approach to solve a given business problem using applied AI and ML.
- Gather and refine a dataset to prepare it for training and testing.
- Train and fine-tune a machine learning model.
- Finalize a machine learning model and present the results to the relevant audience.
- Develop linear regression models.
- Create classification models.
- Build clustering models.
- Construct decision trees and random forests.
- Develop support-vector machines (SVMs).
- Build artificial neural networks (ANNs).
- Promote data privacy and ethical practices within AI and ML projects.
Target Student: The skills covered in this course intersect three key areas—software development, applied mathematics and statistics, and business analysis. This course is designed for individuals who may be strong in one or two of these areas and are looking to enhance their skills in the others, so they can effectively apply artificial intelligence (AI) systems, particularly machine learning models, to solve business problems.
The ideal student might be a programmer seeking to develop additional skills to apply machine learning algorithms to business issues, or a data analyst who already excels at applying math and statistics to business challenges but wants to enhance their technical skills related to machine learning. A typical participant should have several years of experience with computing technology, including some proficiency in computer programming. This course is also designed to help students prepare for the CertNexus® Certified Artificial Intelligence (AI) Practitioner (Exam AIP-110) certification.
CYBERSECURE CODER (CSC)
21 HoursThis course caters to individuals such as software developers, testers, and architects involved in creating software using different programming languages and platforms like desktop, web, cloud, and mobile. It aims to enhance their capacity to produce software of superior quality, with a special focus on security and privacy aspects.
Certified Internet of Things Security Practitioner (CIoTSP™)
21 HoursThis course is tailored for professionals aiming to showcase a vendor-neutral, cross-industry skill set that will empower them to design, implement, operate, and manage a secure IoT ecosystem effectively.
Target Student: This course is intended for IoT practitioners who wish to enhance their skills and knowledge in IoT security and privacy. It is also suitable for students pursuing the CertNexus Certified Internet of Things Security Practitioner (CIoTSP) certification and preparing for Exam ITS-110.
CertNexus CyberSAFE
7 HoursObjectives:
In this course, you will identify many of the common risks involved in using conventional end-user technology, as well as ways to use it safely, to protect yourself from those risks.
You will:
- Identify security compliance measures.
- Address social engineering attempts.
- Secure devices such as desktops, laptops, tablets, smartphones, and more.
- Use the Internet securely.
Target Student
This course is designed for you as a non-technical end user of computers, mobile devices, networks, and the Internet, to enable you to use technology more securely to minimize digital risks.
This course is also designed for you to prepare for the Certified CyberSAFE credential. You can obtain your Certified CyberSAFE certificate by completing the Certified CyberSAFE credential process on the CHOICE platform following the course presentation.