Introduction to Industrial Internet of Things – IMR


In this course, Mike Hibbett - a veteran of IIoT hardware design provides a broad, un-biased introductory overview of Industrial Internet of Things.

Is this course for you?

It is intended for anyone interested in understanding and potentially employing IIoT technologies, it covers the hype, acronyms, pitfalls and challenges involved in deploying an IIoT project.

Delivery Online learning

Duration 1 Day
Cost €567
Level Introduction

Target Audience

Manufacturing process engineers, project managers interested in sensor technology deployment.

Learning Objectives

Learn what IIoT is and how it delivers value. Discover the main vendors in this space. Learn about ‘sensing’ and types of suitable/problematic environments. How sensors communicate and the role of security.


  • Who Are IMR?
  • Format for the day
  • Who is this for?
  • What we hope you will gain from this
  • Module 01 What is IIoT?

  • What is IIoT? A definition
  • Sensors
  • Monitoring what?
  • So what is IIoT?
  • Module 02 How can IIoT deliver value?

  • What are the use-cases, which of them make sense, and why? How can IIoT deliver value?
  • How should an organisation approach adopting IIoT?
  • Consider an organisation’s readiness for new technology, appetite for investment, staff training, scalability
  • Real-world successes, and failures, discuss why
  • Module 03 Who are the main vendors in this space?

  • Sensor Suppliers
  • Gateway Suppliers
  • Backend Suppliers
  • Module 04 What can we sense?

  • What types of environmental conditions are suitable for sensing? Why?
  • What environmental conditions are problematic? In what way?
  • What sensors can be used?
  • Module 05 Communication

  • Discuss how sensors connect to some kind of gateway. How do these sensors connect?
  • Detail gateway technology, options available, pitfalls with “POC” hardware, scalability
  • Discuss Radios, wires, Gateways
  • Power considerations – including battery types. White Paper
  • Module 06 Security

  • Typical threats – external actors, weak implementations, poor user access management
  • How to understand your threat model & security architecture
  • Proving your solution is secure
  • Discuss lack of security standards for system solutions
  • Summary

  • Closing Summary
  • Key takeaways
  • Build or buy?
  • What skill sets are required?
  • What does the future look like?
  • Course Content

    Delivery: Live facilitator led Microsoft Teams based workshops.
    Learning platform: Zoom or MS Teams.
    Learning methodology: Real world activities by topic.
    Learning transfer: SME presentation, interactive Q&A, Scenario
    based quiz and reinforcement reflection.