Internet of things is being offered as an add on course for Second sem B.Sc mathematics students in the college. The certificate is being issued by International Association of Business Analytics(IABAC). There are 11 students in the class .All the Classes are conducted through online mode in adherence  COVID protocol.Classes were engaged by Aswin paulson of Computer science Department,SCAS.

This Specialization covers to describes physical objects (or groups of such objects) with sensors, processing ability,software, and other technologies that connect and exchange data with other devices and systems over the internet or other communications networks.

1.The IoT Landscape.: 1.1.What Is IoT? 1.2.Applications. 1.3.Architectures. 1.4.Wireless Networks. 1.5 Devices 1.6.Security and Privacy. 1.7.Event-Driven.Systems. 1.8. Reference.

2.10T System Architectures: 2.1.Introduction. 2.2.Protocols.Concepts. 2.3.1oT-Oriented.Protocols. 2.4.Databases. 2.5.Time Bases. 2.6.Security.

3.IoT Devices.: 3.1.The IoT Device Design Space. 3.2.Cost of Ownership and Power Consumption. 3.3.Cost per Transistor and Chip Size., 3.4.Duty Cycle and Power Consumption. 3.5.Platform Design. 3.6.Summary.

4.Event-Driven.System.Analysis.: 4.1.Introduction. 4.2.Previous Work. 4.3.Motivating Example. 4.4.IoT Network Model. 4.4.1.Events. 4.4.2.Networks. 4.4.3.Devices and Hubs. 4.4.4.Single-Hub Networks. 4.4.5.Multi-hub Networks. 4.4.6. Network Models and Physical Networks. 4.5.IoT Event Analysis. 4.5.1.Event Populations. 4.5.2.Stochastic Event Populations. 4.5.3.Environmental Interaction  Modeling. 4.5.4.Event Transport and Migration.

5.Industrial Internet of Things.: 5.1.Introduction. 5.2.Industries 4.0. 5.3.Industrial Internet of Things (IoT ). 5.4.1oT Architecture. 5.5.Basic Technologies. 5.6.Applications and Challenges References.

6.Security.and.Safety.: 6.1.Introduction. 6.2.Systems Security. 6.3.Network Security. 6.4.Generic Application Security. 6.5.Application Process Security and Safety. 6.6.Reliable-and-Secure-by-Design IoT Applications. 6.7.Run-Time Monitoring. 6.8.The ARMET Approach. 6.9.Privacy and Dependability.

7.Security Testing IoT Systems.: 7.1.Introduction. 7.2.Fuzz. Testing for Security. 7.2.1. White Box Fuzzing. 7.2.2. Black-Box Fuzzing. 7.3. Fuzzing Industrial Control Network  Systems. 7.4. Fuzzing  Modbus. 7.4.1. The Modbus Protocol. 7.4.2. Modbus/TCP Fuzzer