This grant will study and support the establishment of faculty development activities, industry credentials and assessment of core competencies associated with the training of IoT technicians.
Questions about integrating IoT into your Curriculum or Faculty Development Program?
Contact Chuck Bales at bales@morainevalley.edu for more information.
IoT Curriculum & Faculty Development News
Workforce Domain Resources
1.1 Device Management - Configuration Management
Configuration management (CM) is a systems engineering process for establishing and maintaining consistency of a product’s performance, functional, and physical attributes with its requirements, design, and operational information throughout its life.
1.2 Device Management - Embedded Computers
1.3 Device Management - Hardware / Device Management
The Internet of Things consist of environments of smart devices. These devices include sensors, actuators, cameras, micro controllers and micro or credit card size computers. The proper management of these devices is a critical responsibility for IoT security technicians.
View 1.3 Device Management – Hardware/Device Management (pdf)
1.4 Device Management - Systems Integration
The term Systems Integration refers to integrating IoT devices from different manufacturers into a common environment. System Integration is highly dependent upon industry standards and protocols in collaboration between product vendors.
1.5 Device Management - Systems Testing and Evaluation
IoT environments can be fluid and experience continuing change. These changes require highly dependable systems that need to be tested and evaluated on a regular basis. Testing would include evaluating the proper installation and configuration.
View 1.5 Device Management – Systems Testing and Evaluation (pdf)
2.1 Information Communication Technologies - Computer Forensics
Computer Forensics is the process and practices of collecting and analyzing data. As an IoT security technician computer forensics may be used to investigate a security incident, attack or data breach. Computer Forensics requires the knowledge of many special tools, hardware and programs.
View 2.1 Information Communication Technologies – Computer Forensics (pdf)
2.2 Information Communication Technologies - Network Defense
Network Defense refers to the processes and devices used to protect a network from internal and external threats. The first level of network defense starts with perimeter protection including firewalls and access control lists.
View 2.2 Information Communication Technologies – Network Defense (pdf)
2.3 Information Communication Technologies - Computers and Electronics
View 2.3 Information Communication Technologies – Computers and Electronics (pdf)
2.4 Information Communication Technologies - Cryptography/Cryptoanalysis
View 2.4 Information Communication Technologies – Cryptography / Crytoanalysis (pdf)
2.5 Information Communication Technologies - Data Management
View 2.5 Information Communication Technologies – Data Management (pdf)
2.6 Information Communication Technologies - Identity Management
View 2.6 Information Communication Technologies – Identity Management (pdf)
2.7 Information Communication Technologies - Information Security Principles
Information Security Principles are the overriding philosophies that guide an organization’s information security management plan. These principles include availability, integrity and confidentiality of the organization’s information systems.
View 2.7 Information Communication Technologies – Information Security Principles (pdf)
2.9 Information Communication Technologies - Internal Controls
View 2.9 Information Communication Technologies – Internal Controls (pdf)
2.10 Information Communication Technologies - Modeling and Simulation
View 2.10 Information Communication Technologies – Modeling and Simulation (pdf)
2.11 Information Communication Technologies - Network Management
View 2.11 Information Communication Technologies – Network Management (pdf)
2.12 Information Communication Technologies - Operating Systems
View 2.12 Information Communication Technologies – Operating Systems (pdf)
2.13 Information Communication Technologies - Surveillance
Surveillance refers to the technologies and processes used to monitor the information technology devices and systems. Surveillance can range from guards, cameras, intrusion detection systems and local logs on hosting devices.
View 2.13 Information Communication Technologies – Surveillance (pdf)
2.14 Information Communication Technologies - Security Awareness
Security Awareness refers to the organizations efforts to make all personnel familiar with the organizations policies, processes and technologies used to protect the organizations information systems. Organizations must heavily invest in technologies and procedures that protect the organizations information infrastructure.
View 2.14 Information Communication Technologies – Security Awareness (pdf)
2.15 Information Communication Technologies - Vulnerability Assessment
View 2.15 Information Communication Technologies – Vulnerability Testing (pdf)
2.16 Information Communication Technologies - Web Technologies
Web Technology includes web based systems that enable an organization to deploy, authenticate, control and collect data from their IoT devices. The growth of web based technologies in the IoT field has grown exponentially and understanding of the underlying technology is a critical skill for the IoT security technician.
View 2.16 Information Communication Technologies – Web Technologies (pdf)
3.1 Information / Data Assurance - Database Administration
View 3.1 Information / Data Assurance – Database Administration (pdf)