Course Code: embeddedsecurity
Duration: 21 hours
Prerequisites:
  • Experience with embedded systems development.

Audience

  • Embedded systems professionals
  • Security professionals
Overview:

This instructor-led, live training introduces the system architectures, operating systems, networking, storage, and cryptographic issues that should be considered when designing secure embedded systems.

By the end of this course, participants will have a solid understanding of security principles, concerns, and technologies. More importantly, participants will be equipped with the techniques needed for developing safe and secure embedded software.

Format of the course

  • Interactive lecture and discussion.
  • Lots of exercises and practice.
  • Hands-on implementation in a live-lab environment.

Course Customization Options

  • To request a customized training for this course, please contact us to arrange.
Course Outline:

Introduction

  • Security vs embedded systems security

Characteristics of Embedded Application Security

  • Embedded network transactions
  • Automotive security
  • Android devices
  • Next-generation software-defined radio

Critical Aspects of an Embedded System

  • Microkernel vs monolith
  • Independent security levels
  • Core security requirements
  • Access control
  • I/O virtualization

Performing Threat Modeling and Assessment  

  • Attackers and assets
  • Attack surface
  • Attack trees
  • Establishsing a security policy

Developing Secure Embedded Software

  • Secure coding principles
  • Secure program design
  • Minimal Implementation
  • Component architecture
  • Least privilege
  • Secure development process
  • Independent expert validation
  • Model-driven design
  • Code review and static analysis
  • Security testing
  • Peer code reviews

Understanding and Implementing Cryptography

  • Cryptographic modes
  • Cryptographic hashes
  • Cryptographic certifications
  • Managing keys
  • Block ciphers
  • Message Authentication Codes
  • Random Number Generation

Data Protection

  • Data-in-motion protocols
  • Securing data in motion
  • Data-at-rest protocols
  • Securing data at rest

Mitigating Attacks

  • Common software attacks
  • Preventing side-channel attacks

Retrofitting Security in Existing Projects

  • Securing bootloaders and firmware updates

Summary and Next Steps

Sites Published:

United Arab Emirates - Embedded Systems Security

Qatar - Embedded Systems Security

Egypt - Embedded Systems Security

Saudi Arabia - Embedded Systems Security

South Africa - Embedded Systems Security

Brasil - Embedded Systems Security

Canada - Embedded Systems Security

中国 - Embedded Systems Security

香港 - Embedded Systems Security

澳門 - Embedded Systems Security

台灣 - Embedded Systems Security

USA - Embedded Systems Security

Österreich - Embedded Systems Security

Schweiz - Embedded Systems Security

Deutschland - Embedded Systems Security

Czech Republic - Embedded Systems Security

Denmark - Embedded Systems Security

Estonia - Embedded Systems Security

Finland - Embedded Systems Security

Greece - Embedded Systems Security

Magyarország - Embedded Systems Security

Ireland - Embedded Systems Security

Luxembourg - Embedded Systems Security

Latvia - Embedded Systems Security

España - Seguridad de sistemas integrados

Italia - Embedded Systems Security

Lithuania - Embedded Systems Security

Nederland - Embedded Systems Security

Norway - Embedded Systems Security

Portugal - Embedded Systems Security

România - Embedded Systems Security

Sverige - Embedded Systems Security

Türkiye - Embedded Systems Security

Malta - Embedded Systems Security

Belgique - Sécurité des Systèmes Embarqués

France - Sécurité des Systèmes Embarqués

日本 - Embedded Systems Security

Australia - Embedded Systems Security

Malaysia - Embedded Systems Security

New Zealand - Embedded Systems Security

Philippines - Embedded Systems Security

Singapore - Embedded Systems Security

Thailand - Embedded Systems Security

Vietnam - Embedded Systems Security

India - Embedded Systems Security

Argentina - Seguridad de sistemas integrados

Chile - Seguridad de sistemas integrados

Costa Rica - Seguridad de sistemas integrados

Ecuador - Seguridad de sistemas integrados

Guatemala - Seguridad de sistemas integrados

Colombia - Seguridad de sistemas integrados

México - Seguridad de sistemas integrados

Panama - Seguridad de sistemas integrados

Peru - Seguridad de sistemas integrados

Uruguay - Seguridad de sistemas integrados

Venezuela - Seguridad de sistemas integrados

Polska - Embedded Systems Security

United Kingdom - Embedded Systems Security

South Korea - Embedded Systems Security

Pakistan - Embedded Systems Security

Sri Lanka - Embedded Systems Security

Bulgaria - Embedded Systems Security

Bolivia - Seguridad de sistemas integrados

Indonesia - Embedded Systems Security

Kazakhstan - Embedded Systems Security

Moldova - Embedded Systems Security

Morocco - Embedded Systems Security

Tunisia - Embedded Systems Security

Kuwait - Embedded Systems Security

Oman - Embedded Systems Security

Slovakia - Embedded Systems Security

Kenya - Embedded Systems Security

Nigeria - Embedded Systems Security

Botswana - Embedded Systems Security

Slovenia - Embedded Systems Security

Croatia - Embedded Systems Security

Serbia - Embedded Systems Security

Bhutan - Embedded Systems Security

Nepal - Embedded Systems Security

Uzbekistan - Embedded Systems Security