94
edits
No edit summary |
|||
Line 31: | Line 31: | ||
|{{Hl2}} |'''Exercise''' | |{{Hl2}} |'''Exercise''' | ||
|- | |- | ||
| align="right" | | | align="right" | 21.04.2020 | ||
| Introduction to Internet of Things | | Introduction to Internet of Things | ||
| Hannes Tschofenig | | Hannes Tschofenig | ||
Line 37: | Line 37: | ||
| | | | ||
|- | |- | ||
| align="right" | | | align="right" | 23.04.2020 | ||
| The Arm Architecture (Cortex M-class vs. Cortex A-class) | | The Arm Architecture (Cortex M-class vs. Cortex A-class) | ||
| Hannes Tschofenig | | Hannes Tschofenig | ||
Line 43: | Line 43: | ||
| Get hardware & software working | | Get hardware & software working | ||
|- | |- | ||
| align="right" | | | align="right" | 28.04.2020 | ||
| Local Communication (UART, I2C, SPI) | | Local Communication (UART, I2C, SPI) | ||
| Hannes Tschofenig | | Hannes Tschofenig | ||
Line 49: | Line 49: | ||
| Use of a sensor communication | | Use of a sensor communication | ||
|- | |- | ||
| align="right" | | | align="right" | 30.04.2020 | ||
| Radio Technologies (BLE, Thread, NB-IoT, LoRa) | | Radio Technologies (BLE, Thread, NB-IoT, LoRa) | ||
| Hannes Tschofenig | | Hannes Tschofenig | ||
Line 55: | Line 55: | ||
| Use of a radio technology | | Use of a radio technology | ||
|- | |- | ||
| align="right" | | | align="right" |05.05.2020 | ||
| Internet Protocols for IoT (CoAP and MQTT vs. HTTP) | | Internet Protocols for IoT (CoAP and MQTT vs. HTTP) | ||
| Hannes Tschofenig | | Hannes Tschofenig | ||
Line 61: | Line 61: | ||
| | | | ||
|- | |- | ||
| align="right" | | | align="right" | 07.05.2020 | ||
| Security Threats and Security Requirements | | Security Threats and Security Requirements | ||
| Hannes Tschofenig | | Hannes Tschofenig | ||
Line 67: | Line 67: | ||
| | | | ||
|- | |- | ||
| align="right" | | | align="right" | 12.05.2020 | ||
| Device Management | | Device Management | ||
| Hannes Tschofenig | | Hannes Tschofenig | ||
Line 73: | Line 73: | ||
| Use of LwM2M | | Use of LwM2M | ||
|- | |- | ||
| align="right" | | | align="right" | 14.05.2020 | ||
| Securing IoT - Communication Security | | Securing IoT - Communication Security | ||
| Hannes Tschofenig | | Hannes Tschofenig | ||
Line 79: | Line 79: | ||
| Secure IoT communication | | Secure IoT communication | ||
|- | |- | ||
| align="right" | | | align="right" | 19.05.2020 | ||
| Securing IoT – Hardware Security Technology (TEEs and TrustZone) | | Securing IoT – Hardware Security Technology (TEEs and TrustZone) | ||
| Hannes Tschofenig | | Hannes Tschofenig | ||
Line 85: | Line 85: | ||
| Use hardware security mechanisms | | Use hardware security mechanisms | ||
|- | |- | ||
| align="right" | | | align="right" | 21.05.2020 | ||
| Securing IoT – Firmware Updates, Secure Boot and Attestation | | Securing IoT – Firmware Updates, Secure Boot and Attestation | ||
| Hannes Tschofenig | | Hannes Tschofenig | ||
Line 91: | Line 91: | ||
| Write your own bootloader | | Write your own bootloader | ||
|- | |- | ||
| align="right" | | | align="right" | 26.05.2020 | ||
| Privacy | | Privacy | ||
| Hannes Tschofenig | | Hannes Tschofenig | ||
Line 97: | Line 97: | ||
| | | | ||
|- | |- | ||
| align="right" | | | align="right" |28.05.2020 | ||
| Exam | | Exam | ||
| Hannes Tschofenig | | Hannes Tschofenig |
edits