Guruable Workshops and Training Courses

You can buy any of these workshops by logging into your IEW account, after you signup for a pass.

HOW TO MAKE REAL IoT PRODUCTS THAT SELL

Vinay Chaddha, Electronic Hobbyist, and CEO, GVC Systems Pvt Ltd. (Speaker Profile)

Vinay Chaddh\ha at IEW 2018
Vinay Chaddha, Electronic Hobbyist and CEO, GVC Systems Pvt Ltd
Today IOT is hot. Still, if you look around and you will not find IoT products that are impacting your life. While many engineers feel that they are an expert in IOT and can design products, there are a few things that are essential to building real products that can be sold. This workshop is going to discuss what is required in commercial IOT products and why there are not too many IOT products around your home/office/roads. We start by removing hype around IoT and talk about what is an electronic product that can connect to the Internet to make life more simple, secure, safe and convenient. We will showcase some commercial devices, how they are adding value for business/customers and make money from designers.and finally the real thing “How to build sellable IOT products and make money”.
Key takeaways
  • Understand what is IoT by removing the hype around word ‘IoT’.
  • How important is hardware in IoT?
  • Complete electronic hardware design for a commercial IOT device.
  • How to gain expertise and build sellable IOT product.

MAKE YOUR FIRST IoT PRODUCT

By Arzan Amaria, Solutions Architect, CloudThat

By Arzan Amaria, Solutions Architect, CloudThat (Speaker Profile)

This workshop will be a hands-on experience for building a small prototype of an ideal product using multiple technologies. By following step by step instructions and practical assistance, participants would be able to build and make a connected device which can inspire them to innovate new products. The instructor would share the right logic and resources required for anyone to jumpstart the journey of IoT development. The main objective of this workshop is to inspire professionals to go ahead and develop IoT solutions and products from scratch.

Key takeaways

  • Attendees would understand the flow of product development in IoT.
  • Hands-on experience would be given for creating an end-to-end prototype.

WORKSHOP ON END-TO-END VEHICLE DIAGNOSTICS

By Nisarg Nirmal Kumar, Co-founder, Skillfinity (Speaker Profile)

Nisarg Nirmal kumar at IEW 2018
Nisarg Nirmal Kumar, Co-founder, Skillfinity

A lot of buzz has been created around Bharath Stage 6 in India lately. The regulation is all about stricter pollution norms, safety and also diagnostics. Many of you would have heard about the diagnostics part as OBD or On-Board Diagnostics. You also would have seen OBD in action in the service stations where the service personnel connects a device or a laptop to the vehicle and determines any possible faults. This workshop will introduce Vehicle Diagnostics from the very basics, its timeline, the technology involved and the standards involved. There will also be the discussion on the future of vehicle diagnostics and its value adds to the industry. A complete explanation will be provided on how vehicle diagnostics play an important role in IoT. There will be a live demo of OBD on a vehicle.

Key Takeaways

  • A complete understanding of Vehicle Diagnostics and the technology involved.
  • An overview of Vehicle Network – CAN (Controller Area Network).
  • Diagnostic messages – PID, DID, DTCs etc.
  • Diagnostic – IoT connection.
  • An overview of the industry standards.
  • Tools, hardware, and software used for vehicle diagnostics.
  • Applications of vehicle diagnostics.
  • How vehicle diagnostics brings down OEMs’ effort of testing.

Prerequisites

  • Interest and enthusiasm in automotive technology.
  • Basic understanding of electronics and software.
  • Basic understanding of automotive technology.

GET STARTED WITH AI WITH ROBOTICS AND ARDUINO

By Prem Mohan, Research Scientist, IR-IIT D (Speaker Profile)

Prem Mohan at IEW 2018
Prem Mohan, Research Scientist, IR – IIT D

This workshop will be focused on AI and its latest trend followed by live examples. AI is definite future yet lots of illusions and fear involved with it. Curtains need to be removed layer by layer to get clear vision. A Narrative Science Survey found last year that 38% of enterprises are already using AI, growing to 62% by 2018. Forrester Research predicted a greater than 300% increase in investment in artificial intelligence in 2017 compared with 2016.

Key takeaways

• How do Robotics and Arduino work with AI
• Wha are the Real Life Applications and future development of AI with Machine Learning
• What are GANs and Brain-Computer Interface (BCI)


SCCI LEVEL 1 CERTIFICATION WORKSHOP: SMART FACTORY  REFERENCE ARCHITECTURE

By Gopi K Bulusu is the CEO and Chief Technologist at Sankhya Technologies Private Limited (Speaker Profile)

Gopi K Bulusu, CEO and Chief Technologist at Sankhya Technologies Private Limited

A Reference Architecture offers a broad overview of Smart Factory SubSystems and Components and thereby helps promote innovation, collaboration and co-creation. This workshop will explain Smart Factory Reference Architecture and Factory as a Service in detail with the use cases. I will be an interactive session followed by a Quiz and the attendees would be provided a Certificate by Super Computing Consortium of India

(India’s leading platform to advance widespread use of large-scale computing. Visit: http://www.scci.in)

This workshop is for Entrepreneurs, Strategists, Designers, Architects, Investors, and Finance Controllers. If you are a policymaker, this would be a right platform to get started on your Smart Factory policy journey with a sound foundation. Help create employment in your region.

Key Takeaways
  • Learn to Connect the Smart Factory dots and thereby succeed in your Smart Factory journey.
  • Bring together the strategic, management and technology teams of your organization to defined and support key Smart Factory business objectives.
  • Get equipped to create standards for your domain by gaining necessary skills for Level-2 certification.
  • If you are an investor or finance controller – understand better how to select the most promising startup investments.
Prerequisites (Recommended – not mandatory)
  • A bachelors degree in STEM or Management
  • At least 5 years of prior work experience.

INTERNET OF “HIDDEN THINGS”: HOW TO BUILD A CONFIDENTIAL IoT NETWORK USING TOR & DOCKER  CONTAINERS

By Abhinav Biswas, Tech Evangalist., National Cyber Defence Research (Speaker Profile)

Abhinav Biswas at Iew 2018
Abhinav Biswas, Tech Evangalist., National Cyber Defence Research

This workshop will sensitize the audience about how we can leverage the anonymity & containerization benefits of TOR(The Onion Router)  & Docker technologies to address the security & privacy challenges in IOT Businesses and stop Surveillance Capitalism. There will be several Live Demos on how to build an Internet of ‘Hidden’ Things by creating confidential, authenticated and anonymous IOT Applications using TOR Hidden Services amalgamated with Docker Containers. The demos will show that these ‘Hidden’ Things/Devices can even hide the fact they exist at all if you don’t know the necessary cookie. One can neither crawl nor probe your IoT device through the Internet while your device uses the Onion Authentication feature of TOR Hidden Services. The workshop would also cover the dark-side of using the Internet of Hidden Things in future.

Key Takeaways

  • Demystifying IOT Infrastructure fundamentals & Learning how every electronic device is getting Smarter.
  • Advance the state of knowledge in the field of IOT Security & Privacy Challenges
  • Understanding why Privacy & Anonymity are taking lead over Security in the IoT Ecosystem.
  • In-depth analysis of Tor Anonymity Protocol and its application in latest state-of-the-art IOT Business Models.
  • Identifying the key elements in establishing an Internet of ‘Hidden’ Things for Smart & Privacy-aware IOT services.

Prerequisites
Basic knowledge about Enterprise Computer Networks, Cryptography, Cyber Security and Smart Devices

Read more for subtopics and more details about this workshop.


WORKSHOP ON PHYSICAL COMPUTING 101

By Jaison Leon, Co-Founder & CEO, QtPi Robotics.(Speaker Profile)

By Jaison Leon, Co-Founder & CEO, QtPi Robotics
By Jaison Leon, Co-Founder & CEO, QtPi Robotics

QtPi a Make in India initiative has developed an Arduino based robotic kit which helps everyone to get started with physical computing easily. The building blocks and drag and drop programming help to build a prototype without any prior experience with programming.
Design: design anything from remote control car to voice control home automation.
Electronics: plug and play modules helps to understand electronics better.
Software: build an android app by drag and drop method.
Integration: showcase your prototype or using automation.

Key takeaways

  • Introduction to physical computing.
  • The audience will be walked through DESI (Design, Electronics, Software, Integration).
  • The audience will create a working prototype of a real-world scenario.

Prerequisites

A Laptop


HOW TO OBTAIN SEAMLESS DEVICE CONNECTIVITY WITH IoTIVITY AND ZEPHYR

By Rajesh Sola, Education Specialist, KPIT (Speaker Profile)

Rajesh Sola at IEW 2018
Rajesh Sola, Education Specialist, KPIT Technologies Ltd.

This session aims at introducing two Linux Foundation hosted projects to address the emerging needs of connected things with rich integrations and inter-operable standards. First one is IoTivity, an open source software framework enabling seamless device-to-device connectivity with rich inter-operability support for various IoT segments. It is a reference implementation of Open Connectivity Foundation (OCF) specification standards and aiming towards overcoming challenges in standardization efforts. The second one is Zephyr, a small scalable open source RTOS for embedded and IOT devices. It comes with wide support for various target hardware with constrained resources and offers rich connectivity support. Zephyr powered devices can support OCF standards with the port of IoTivity-Constrained project. Finally, this talk concludes with the glimpse of OCF role in connected auto-motives.
Subtopics
This workshop aims at covering following aspects of OCF, IoTivity & Zephyr.

  • IoTivity Architecture, API Support.
  • Open Connectivity Foundation(OCF) – goals & specification standards.
  • Running IoTivity examples, Working with the simulator.
  • OCF Specifications.
    – Resource & Data Models, Device Profiles.
    – Resource Discovery, Introspection & CRUDN Operations.
  • Introduction to Zephyr OS, Architecture, APIs.
  • Network Subsystem in Zephyr, Protocol support.
  • Running Zephyr examples in Qemu environment.
  • IoTivity-Constrained: OCF on tiny devices, ports.
  • OCF implementation in Zephyr (Qemu based).
  • OCF’s Automotive Project for connected solutions.
  • IoTivity support in automotive distributions (GENIVI, AGL etc.).

Prerequisites

  • BYOD to run Ubuntu VM (Software and download steps).
  • Basic IOT Concepts & Terminology.
  • Basic familiarity with Linux (preferred).
  • Programming knowledge of C/C++ (preferred).

HOW TO GET A JOB IN BIGGIES: TECH HIRE 101

By Nikhil Kumar, Software Development Engineer, Amazon (Speaker Profile)

Nikhil at IEW 2018
Nikhil Kumar, Software Development Engineer, Amazon

The criticality of good engineers in tech like IOT increases with the seniority. Numerous large, once-successful companies have failed in recent years. Some have gone bankrupt, while others have been substantially reduced in size and fallen from an industry leadership position. Examples include Wang Labs, Digital Equipment, Borders, and Blockbuster. What caused their failures? Were they not sufficiently analytical? Perhaps they had adequate information and analysis but made irrational decisions.
In the field of tech one wrong architectural decision would mean the collapse of the entire software stack and the damage will irreparable. One server overload of Flipkart still stigmatizes it as “flopkart”. This talk would you give you the necessities requires to get into companies like Amazon, google, apple, facebook, Intel, Nvedia, Qualcomm. Nikhil will talk about what skills and approach should be stressed upon, how to hone your Requirement specific skills, how to complement the skills that you lack. He will also be covering the issue of hardware/embedded related skills being in short supply in India and
many Indian companies dealt with the problem successfully. Some interview questions that will help in segregating the non-passionate/ bluffers from real gold.


HOW TO DESIGN YOUR OWN IoT APPLICATIONS

By Syam Madanapalli, Head- IoT Delivery and SME, NTT Data Services (Speaker Profile)

Syam Madanapalli
Syam Madanapalli, Head- IoT Delivery and SME, NTT

The Internet of Things will be the Next Big Thing on the Planet Earth, and everybody is a stakeholder as the IoT is orthogonal and will be pervasive, impacting the roots of our lives. This workshop is meant for introducing the Internet of Things, IoT engineers, and managers who would like to understand the fundamentals of IoT design and will be able to explore for more to be able to participate in the design of IoT applications for solving problems or expected outcomes. This workshop takes the approach of learning through basics, examples and by doing exercises. The workshop is aimed at all stakeholders in the industry (all verticals and for all levels of practitioners).

Key Takeaways
• How to apply  IoT to solving the problems?
• How to choose a particular wireless technology?
• Choosing proper design approach for innovating the IoT applications.
• What are the Considerations for building IoT networks and applications?
• How to secure the Internet of Things?

Prerequisites
• Basics of Object Oriented Design and how the Internet works.
• A Laptop with Microsoft PowerPoint.


WORKSHOP: RIPPING PLCs OFF, YOU CAN CALL IT PENTESTING, SO BE IT (6-hour Workshop)

By Arun Mane, Hardware, IOT and ICS Security Researcher (Speaker Profile), Payatu and Rushikesh D. Nandedkar, Security analyst, FireEye, Inc. (Speaker Profile)Arun Mane and Rushikesh at IEW 2018

This workshop will concentrate on methodologies to conduct penetration testing in real time Hardware PLCs as well as simulators to mitigate some common attacks, vulnerabilities and also concentrate on bridging gaps in knowledge of ICS (Industrial Control System) with introducing ICS  along with briefing their jargons, typical architecture, briefing of various
protocols, security concerns, tools for pen-testing and their methodologies to perform pen-test along with illustrating basic programming of PLC and their wirings. This workshop will put lights on those people who do not know about ICS, PLC, and methodologies to pen-test PLC’s. The attendees will get the chance to pen-test real-time Hardware PLC and simulator
In this Lab session, there are two modules i.e Module A and Module B, each module covers different parts of the workshop.

Module A 
This module covers full theory part of PLC with introducing to ICS as follows
• Briefing of Scada: Definition of Scada, their usage, and examples.
• Briefing of HMI: Definition of HMI, their usage, and examples.
• Briefing of RTU/PLC: – Definition of RTU/ PLC, their usage, and examples.
• Briefing Historian: – Definition of Historian, their usage, and examples.
• Diagram of typical Scada and plc architecture and their briefing.
• Briefing of ICS protocols like Modbus,s7comm, and BacNet:- understanding packet architecture and details of function codes etc.
• List of tools.
• Understanding the snippet of PLC program.
Module B
This module covers Hands-on session of Pen-testing with help of available tools which is mentioned in Tool Section.
• Finding PLC’s on internet with Shodan and zoom eye.
• Modbus Network Scanning: This attack involves sending benign messages to all
possible addresses on a Modbus network to obtain information about field devices.
• Passive Reconnaissance: This attack involves passively reading Modbus and other
protocols messages or network traffic.
• Reading register values over Modbus.
• Reading coil values over Modbus.
• Writing Register and coil values to toggle the actuators over Modbus.
• Writing status of AST monitoring systems (Changing level of Diesel-petrol tank,
Name of the Tank).
• Scanning and enumeration of BACnet communication.
• Toggle BMS actuators over BACnet communication.
• Reconnaissance and Enumeration of Hardware PLC (Delta and Siemens PLC, BanNet Devices ) and software simulator (Modbus/TCP and Siemens s7comm).
• ON/OFF CPU of S7 PLC.
• Injecting PLC programs over s7comm
• S7comm Network Scanning: This attack involves sending benign messages to all possible addresses on an s7comm network to obtain information about field devices.
• Baseline Response Replay: This attack involves recording genuine traffic between a master and a field device, and replaying some of the recorded messages back to the master.
• Rogue Interloper (PLC):- This attack involves attaching a computer with the appropriate (serial or Ethernet) adaptors to an unprotected communication link. This “man-in-the-middle” device can read, modify and fabricate Modbus messages and/or network traffic.

For more about the workshop, click here.


HOW TO BUILD YOUR OWN CHATBOT

By Ajita Jain, Software Engineer, Intuit (Speaker Profile) and Himani Garg, Intuit (Speaker Profile)

BOT is the success mantra for any successful product this era. A chatbot uses machine learning to pick up on conversational cadences, allowing it to effectively mimic human conversation and react to spoken or written prompts to deliver a service. This workshop focuses on addressing the technical aspects of – “What does it take to build a Chatbot?”. The audience will be introduced to the concepts and advantages of chatbot. Using these concepts, the audience will be able to determine relevance to their space and help transform their products to deliver success.

  • We will start with an overview of the concepts of chatbot. We will also touch basics on NLPs, companion apps for chatbots, and authentication mechanism followed in building a bot.
  • We will be discussing various technologies/platforms that have made building chatbots easy. The existing tools like Amazon Lex, API.ai, facebook messenger etc. will be discussed and practically evaluated.
  • The emphasis will be on the collaborative understanding of the basic concepts of building any bot applications like intents, slots, entities, prompts, fulfillment etc.
  • We will talk about a real-time illustration of how ChatBot is being used at Intuit and how is it impacting customer’s lives.
  • The audience will be walked through step by step process of building a BOT using one of the available platforms.

Hardware installations, Materials &/or downloads required in advance
• Laptops
• AWS accounts which users can create in the Free Tier. When users create an AWS account, they will be automatically signed up for the free tier for 12 months.


WORKSHOP ON HOW TO PERFORM HARDWARE REVERSE ENGINEERING – PART I

By Mohammed Pota, Hardware Security Researcher, Payatu (Speaker Profile)and Nitesh Malviya, Security Consultant, Payatu (Speaker Profile)Mohammed and Nitesh at IEW 2018

Learn ‘Hardware Reverse Engineering – Part 1’ from us, where you will get your hands on numerous hardware hacking tools like bus pirate, Ch341a, logic analyzer, etc. We will teach you how to perform different hardware attacks, extract ‘username’ and ‘password’ on our target devices (DIVA).

For this hands-on workshop, we will provide every participant a kit which consists of numerous hardware hacking tools like bus pirate, Ch341a, Logic analyzer and few target devices. Each participant will perform different attacks (sniffing/dumping) on our target devices (DIVA).

Outline

  • Introduction to hardware and Hardware Tools.
  • Attacking Hardware Interfaces.
  • Hardware Reconnaissance: Analyzing the board, Datasheets analysis.
  • UART: What is UART, Identifying UART interface using different methods, Accessing sensor via UART.
  • I2C communication: Introduction, I2C Protocol, Interfacing with I2C, Manipulating Data via I2C, Sniffing run-time I2C communication.

This workshop has several modules with theory and labs involved with each theory. Sniffing and dumping data from different types of EEPROMs and then analyzing it. The PART II of this workshop will take part in the afternoon.

Prerequisites: For Prerequisites for this workshop, click here


WORKSHOP ON HOW TO PERFORM HARDWARE REVERSE ENGINEERING – PART II

By Mohammed Pota, Hardware security researcher, Payatu (Speaker Profile) and Nitesh Malviya, Security Consultant, Payatu (Speaker Profile)Mohammed and Nitesh at IEW 2018

This workshop is a continuation ‘Hardware Reverse Engineering – Part 1’. Though the difficulty level of both the parts is same, they differ in content and usage of hardware tool.

‘Hardware Reverse Engineering – Part 2’ workshop is for professional from security and electronics aiming to specialize in IoT hardware security. It gives hands-on training to our participants where they will master on how to use tools, analyze devices and circuits, identify attack surface, and find vulnerabilities.

For this hands-on workshop, we will provide every participant with a kit which consists of numerous hardware hacking tools like bus pirate, Ch341a, Logic analyzer and few target devices. Each participant will perform different attacks (sniffing/dumping) on our target devices (DIVA).

  • SPI communication: Introduction, SPI Protocol, Interfacing with SPI,  Manipulating data via SPI, Sniffing run-time SPI communication.
  • BLE introduction: BLE Protocol, Communication sniffing, Exploiting a smart bulb, Exploring various hardware hacking techniques and common vulnerabilities.

This workshop has several modules with theory and labs involved with each theory. Sniffing and dumping data from different types of EEPROMs and then analyzing it.

Prerequisites: For Prerequisites for this workshop, click here 


WORKSHOP ON RUNNING ALEXA ON MICROCONTROLLERS – A ESP32 AFFAIR

By Anuj Deshpande, Founder, Makerville solutions (Speaker Profile)

Anuj Deshpande at IEW 2018
Anuj Deshpande, Founder, Makerville Solutions

Running a voice assistant on a microprocessor is pretty straightforward. Doing the same on a resource-constrained microcontroller is quite more complex. This workshop would be about why running voice assistants on microcontrollers is the need of the hour to truly democratizing voice assistants. The cost reduction of doing so is a huge boost to the eventual aim of having an Alexa device in every last room.

Key Takeaways
• Possibilities with connected hardware and voice assistants.
• Requirements of integrating Alexa into your product.
• Capabilities of Espressif ESP32 Wi-Fi microcontroller.
• Trade-offs between microprocessor and microcontroller architectures for connected audio
applications.

Prerequisites
• Familiarity with voice assistants like Google Assistant/Alexa/Siri.
• Basic understanding of the difference between a microprocessor and microcontroller.