How to assign security solutions

Hello,
I’m interested in security challenges of big data generated by IoT devices, for example how to carrying out software-centric solutions to sensors or how to use blockchain in the data transfer phase or…
How can I implement everything I have in mind without having access to ioT devices and servers?
Anybody any suggest would be accept even for consulting

Hey Elnaz. Welcome, and thanks for asking your question! I think the answer you’re looking for is a little too granular for a Tulip University course, unfortunately–these are mostly focused on how to use the Tulip platform. I’d encourage you to ask this question in one of the other channel here, though, as someone might be able to help you out.