NB-IoT for Developers Training Course
NB-IoT allows IoT devices to operate over carrier networks such as GSM and "guard bands" between LTE channels. NB-IoT needs only 200kHz of bandwidth and can efficiently connect large numbers of endpoint devices (up to 50,000 per NB-IoT network cell). Its low power requirements makes it ideal for use in small, uncomplicated IoT gadgets such as smart parking, utilities and wearables.
Most of today's IoT connections are industrial. Industrial IoT (IIoT) connections require Low Power Wide Area (LPWA) technologies to provide connectivity, coverage and subscription capabilities for low bandwidth applications. Although these requirements could be served by existing cellular networks, such networks may not be ideal. NB-IoT (Narrow Band IoT) technology offers a promising solution.
In this instructor-led, live training, participants will learn about the various aspects of NB-IoT (also known as LTE Cat NB1) as they develop and deploy a sample NB-IoT based application.
By the end of this training, participants will be able to:
- Identify the different components of NB-IoT and how to fit together to form an ecosystem.
- Understand and explain the security features built into NB-IoT devices.
- Develop a simple application to track NB-IoT devices.
Format of the course
- Part lecture, part discussion, exercises and heavy hands-on practice
Course Outline
Introduction
- The need for LPWA (Low Power Wide Area)
- Low power consumption, deep coverage, massive connections, easy deployment, network security & reliability, lower component cost
- NB-IoT vs LoRaWAN vs Sigfox
Overview of NB-IoT Architecture
- Design, development, and deployment
- Security based on LTE mobile networks
NB-IoT Ecosystem and Industry Players
- Mobile operators, network infrastructure vendors, chipset suppliers, module vendors, systems integrators, etc.
- Huawei, Ericsson, etc.
NB-IoT Applications
- Smart metering, smart cities, smart buildings, consumers, agriculture and environment
Quality of Service
- Licensed spectrum operation
- Security and reliability
NB-IoT Security
- User identity confidentiality, entity authentication, data integrity, and mobile device identification
NB-IoT Chips
- LTE-M1 and NB-IoT
- Signal processing and power efficiency
- Huawei LiteOS for developers
NB-IoT Connectivity Modules
- Cellular connectivity
- Digital security
NB-IoT Network Devices
- Efficiently locating mobile "things"
Hands-on: Developing a Smart Tracker
- Building a simple location-based tracker
NB-IoT Terminals
- External NB-IoT antennas
- Internal NB-IoT antennas
Hands-on: Expanding the Smart Tracker
- Enabling anti-theft functionality
NB-IoT Service Management Platforms
- Connecting, activating and managing devices securely
- API integration with existing systems
Hands-on: Managing a Fleet of Smart Trackers
- Testing, deploying, and managing multiple smart trackers
Closing Remarks
Requirements
- An understanding of IoT concepts
- Programming experience in any language
- General understanding of software and network security concepts
Audience
- Developers
- Technical Managers
Open Training Courses require 5+ participants.
NB-IoT for Developers Training Course - Booking
NB-IoT for Developers Training Course - Enquiry
NB-IoT for Developers - Consultancy Enquiry
Testimonials (1)
The oral skills and human side of the trainer (Augustin).
Jeremy Chicon - TE Connectivity
Course - NB-IoT for Developers
Provisonal Upcoming Courses (Contact Us For More Information)
Related Courses
AI and IT Audit
14 HoursThis instructor-led, live training in Belgium (online or onsite) is aimed at intermediate-level IT auditors who wish to effectively incorporate AI tools in their audit practices.
By the end of this training, participants will be able to:
- Grasp the core concepts of artificial intelligence and how it is applied in the context of IT auditing.
- Utilize AI technologies such as machine learning, NLP, and RPA to improve audit efficiency, accuracy, and scope.
- Perform risk assessments using AI tools, enabling continuous monitoring and proactive risk management.
- Integrate AI into audit planning, execution, and reporting, enhancing the overall effectiveness of IT audits.
Micro Focus ArcSight ESM Advanced
35 HoursThis instructor-led, live training in Belgium (online or onsite) is aimed at advanced-level security analysts who wish to elevate their skills in utilizing advanced Micro Focus ArcSight ESM content to improve an organization's ability to detect, respond, and mitigate cyber threats with greater precision and speed.
By the end of this training, participants will be able to:
- Optimize the use of Micro Focus ArcSight ESM to enhance monitoring and threat detection capabilities.
- Construct and manage advanced ArcSight variables to refine event streams for more precise analysis.
- Develop and implement ArcSight lists and rules for effective event correlation and alerting.
- Apply advanced correlation techniques to identify complex threat patterns and reduce false positives.
Automotive Cyber Security Fundamentals
21 HoursThis instructor-led, live training in Belgium (online or onsite) is aimed at engineers who wish to safeguard connected vehicles from cyber attacks.
By the end of this training, participants will be able to:
- Implement cybersecurity in automotive systems.
- Choose the most suitable technologies, tools, and approaches.
BCS Foundation Certificate in Information Security Management Principles (CISMP)
21 HoursWho is it for:
Anyone with an interest in information security, whether as a career or for general business knowledge.
This certificate is relevant to anyone requiring an understanding of Information Security Management Principles as well as those with an interest in information security either as a potential career or as an additional part of their general business knowledge. It is very much a firm foundation on which other qualifications can be built or which provides a thorough general understanding to enable organisations to begin to ensure their information is protected appropriately.
What will I learn:
Candidates should be able to demonstrate:
- Knowledge of the concepts relating to information security management.
- Understanding of current national legislation and regulations which impact upon information security management.
- Awareness of current national and international standards, frameworks and organisations which facilitate the management of information security.
- Understanding of the current business and common technical environments in which information security management must operate.
- Knowledge of the categorisation, operation and effectiveness of controls of different types and characteristics.
BCS Foundation Certificate in Information Security Management Principles (CISMP) 4 day
28 HoursWho is it for:
Anyone with an interest in information security, whether as a career or for general business knowledge.
This certificate is relevant to anyone requiring an understanding of Information Security Management Principles as well as those with an interest in information security either as a potential career or as an additional part of their general business knowledge. It is very much a firm foundation on which other qualifications can be built or which provides a thorough general understanding to enable organisations to begin to ensure their information is protected appropriately.
What will I learn:
Candidates should be able to demonstrate:
- Knowledge of the concepts relating to information security management.
- Understanding of current national legislation and regulations which impact upon information security management.
- Awareness of current national and international standards, frameworks and organisations which facilitate the management of information security.
- Understanding of the current business and common technical environments in which information security management must operate.
- Knowledge of the categorisation, operation and effectiveness of controls of different types and characteristics.
Note: This is the four day course which adds one additional day to the standard delivery to provide more time for exam preparation and practice exercises.
BCS Practitioner Certificate in Information Risk Management (CIRM)
35 HoursWho is it for:
Anyone who is involved in the areas of information security and information assurance.
What will I learn:
Candidates should be able to demonstrate:
- How the management of information risk will bring about significant business benefits.
- How to explain and make full use of information risk management terminology.
- How to conduct threat and vulnerability assessments, business impact analyses and risk assessments.
- The principles of controls and risk treatment.
- How to present the results in a format which will form the basis of a risk treatment plan.
- The use of information classification schemes.
Cyber Crisis & Communications Planning
7 HoursThis course discusses how to manage an incident response team, how the first responder act, given the frequency and complexity of today's cyber attacks, incident response is a critical function for organizations. Incident response is the last line of defense, detecting and efficiently responding to incidents requires strong management processes, and managing an incident response team requires special skills and knowledge
CCTV Security
14 HoursThis instructor-led, live training in Belgium (online or onsite) is aimed at security managers who wish to learn basic to intermediate-level CCTV security surveillance and management skills.
By the end of this training, participants will be able to:
- Familiarize the types of CCTV systems and know their benefits and features.
- Understand cabling and CCTV systems setup requirements.
- Install, configure, and manage CCTV systems.
Cyber Defence (SOC) Analyst Foundation
7 HoursThis instructor-led, live training in Belgium (online or onsite) is aimed at beginner to intermediate-level security analysts and system administrators who wish to establish a foundational understanding of Cyber Defence (SOC) analysis.
By the end of this training, participants will be able to:
- Understand the principles of Security Management in a Cyber Defence context.
- Execute effective Incident Response strategies to mitigate security incidents.
- Implement Security Education practices to enhance organizational awareness and preparedness.
- Manage and analyze Security Information for proactive threat identification.
- Utilize Event Management techniques to monitor and respond to security events.
- Implement Vulnerability Management processes to identify and address system vulnerabilities.
- Develop skills in Threat Detection to identify and respond to potential cyber threats.
- Participate in Simulated Attacks to test and improve incident response capabilities.
CipherTrust Manager
21 HoursThis instructor-led, live training in Belgium (online or onsite) is aimed at IT professionals who wish to understand how to use the CipherTrust Solution suite.
By the end of this training, participants will be able to:
- Understand the CipherTrust Solution and its basic functions.
- Evaluate device architecture and usage schemes.
- Manage CipherTrust product suite.
CISA - Certified Information Systems Auditor
28 HoursDescription:
CISA® is the world-renowned and most popular certification for professionals working in the field of IS audit and IT risk consulting.
Our CISA course is an intense, very competitive and exam focused training course. With experience of delivering more than 150+ CISA trainings in Europe and around the world and training more than 1200+ CISA delegates, the Net Security CISA training material has been developed in house with the top priority of ensuring CISA delegates pass the ISACA CISA® Exam. The training methodology focuses on understanding the CISA IS auditing concepts and practicing large number of ISACA released question banks from the last three years. Over a period, CISA holders have been in huge demand with renowned accountings firms, global banks, advisory, assurance, and internal audit departments.
Delegates may have years of experience in IT auditing but perspective towards solving CISA questionnaires will solely depend on their understanding to globally accepted IT assurance practices. CISA exam is very challenging because the chance of a very tight clash between two possible answers exists and that is where ISACA tests you on your understanding in global IT auditing practices. To address these exam challenges, we always provide the best trainers who have extensive experience in delivering CISA training around the world.
The Net Security CISA manual covers all exam-relevant concepts, case studies, Q&A's across CISA five domains. Further, the Trainer shares the key CISA supporting material like relevant CISA notes, question banks, CISA glossary, videos, revision documents, exam tips, and CISA mind maps during the course.
Goal:
The ultimate goal is to pass your CISA examination first time.
Objectives:
- Use the knowledge gained in a practical manner beneficial to your organisation
- Provide audit services in accordance with IT audit standards
- Provide assurance on leadership and organizational structure and processes
- Provide assurance on acquisition/ development, testing and implementation of IT assets
- Provide assurance on IT operations including service operations and third party
- Provide assurance on organization’s security policies, standards, procedures, and controls to ensure confidentiality, integrity, and availability of information assets.
Target Audience:
Finance/CPA professionals, I.T. professionals, Internal & External auditors, Information security, and risk consulting professionals.
CISMP - Certificate in Information Security Management Principles
21 HoursA thorough, practical, 3 day course designed to provide the knowledge and skills required to manage information security, information assurance or information risk based processes. The CISMP course is aligned with the latest national information assurance frameworks (IAMM), as well as ISO/IEC 27002 & 27001; the code of practice and standard for information security. This course is a CESG Certified Training (CCT) course.
The course follows the latest BCS syllabus and prepares delegates for the 2 hour multiple choice BCS examination.
This qualification provides delegates with detailed knowledge of the concepts relating to information security; (confidentiality, integrity, availability, vulnerability, threats, risks and countermeasures), along with an understanding of current legislation and regulations which impact information security management. Award holders will be able to apply the practical principles covered throughout the course ensuring normal business processes become robust and more secure.
Computer Room Security and Maintenance
14 HoursNetwork security begins at the physical level. In this instructor-led, live training in Belgium, participants will learn the security risks related to computer server rooms and how to tighten security through smart practices, planning and technology implementation.
By the end of this training, participants will be able to:
- Assess their organization's security risk, as it relates to computer server rooms.
- Set up control and monitoring systems to restrict physical access to infrastructure.
- Design access policies for different members.
- Effectively communicate security policies with team members.
Mastering Continuous Threat Exposure Management (CTEM)
28 HoursThis instructor-led, live training in Belgium (online or onsite) is aimed at intermediate-level cybersecurity professionals who wish to implement CTEM in their organizations.
By the end of this training, participants will be able to:
- Understand the principles and stages of CTEM.
- Identify and prioritize risks using CTEM methodologies.
- Integrate CTEM practices into existing security protocols.
- Utilize tools and technologies for continuous threat management.
- Develop strategies to validate and improve security measures continuously.
Cyber Emergency Response Team (CERT)
7 HoursThis course discusses how to manage an incident response team. how the first responder act, given the frequency and complexity of today's cyber attacks, incident response is a critical function for organizations.
Incident response is the last line of defense, detecting and efficiently responding to incidents requires strong management processes, and managing an incident response team requires special skills and knowledge