- Experience with embedded systems development.
Audience
- Embedded systems professionals
- Security professionals
This instructor-led, live training introduces the system architectures, operating systems, networking, storage, and cryptographic issues that should be considered when designing secure embedded systems.
By the end of this course, participants will have a solid understanding of security principles, concerns, and technologies. More importantly, participants will be equipped with the techniques needed for developing safe and secure embedded software.
Format of the course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
Introduction
- Security vs embedded systems security
Characteristics of Embedded Application Security
- Embedded network transactions
- Automotive security
- Android devices
- Next-generation software-defined radio
Critical Aspects of an Embedded System
- Microkernel vs monolith
- Independent security levels
- Core security requirements
- Access control
- I/O virtualization
Performing Threat Modeling and Assessment
- Attackers and assets
- Attack surface
- Attack trees
- Establishsing a security policy
Developing Secure Embedded Software
- Secure coding principles
- Secure program design
- Minimal Implementation
- Component architecture
- Least privilege
- Secure development process
- Independent expert validation
- Model-driven design
- Code review and static analysis
- Security testing
- Peer code reviews
Understanding and Implementing Cryptography
- Cryptographic modes
- Cryptographic hashes
- Cryptographic certifications
- Managing keys
- Block ciphers
- Message Authentication Codes
- Random Number Generation
Data Protection
- Data-in-motion protocols
- Securing data in motion
- Data-at-rest protocols
- Securing data at rest
Mitigating Attacks
- Common software attacks
- Preventing side-channel attacks
Retrofitting Security in Existing Projects
- Securing bootloaders and firmware updates
Summary and Next Steps
United Arab Emirates - Embedded Systems Security
Qatar - Embedded Systems Security
Egypt - Embedded Systems Security
Saudi Arabia - Embedded Systems Security
South Africa - Embedded Systems Security
Brasil - Embedded Systems Security
Canada - Embedded Systems Security
中国 - Embedded Systems Security
香港 - Embedded Systems Security
澳門 - Embedded Systems Security
台灣 - Embedded Systems Security
USA - Embedded Systems Security
Österreich - Embedded Systems Security
Schweiz - Embedded Systems Security
Deutschland - Embedded Systems Security
Czech Republic - Embedded Systems Security
Denmark - Embedded Systems Security
Estonia - Embedded Systems Security
Finland - Embedded Systems Security
Greece - Embedded Systems Security
Magyarország - Embedded Systems Security
Ireland - Embedded Systems Security
Luxembourg - Embedded Systems Security
Latvia - Embedded Systems Security
España - Seguridad de sistemas integrados
Italia - Embedded Systems Security
Lithuania - Embedded Systems Security
Nederland - Embedded Systems Security
Norway - Embedded Systems Security
Portugal - Embedded Systems Security
România - Embedded Systems Security
Sverige - Embedded Systems Security
Türkiye - Embedded Systems Security
Malta - Embedded Systems Security
Belgique - Sécurité des Systèmes Embarqués
France - Sécurité des Systèmes Embarqués
日本 - Embedded Systems Security
Australia - Embedded Systems Security
Malaysia - Embedded Systems Security
New Zealand - Embedded Systems Security
Philippines - Embedded Systems Security
Singapore - Embedded Systems Security
Thailand - Embedded Systems Security
Vietnam - Embedded Systems Security
India - Embedded Systems Security
Argentina - Seguridad de sistemas integrados
Chile - Seguridad de sistemas integrados
Costa Rica - Seguridad de sistemas integrados
Ecuador - Seguridad de sistemas integrados
Guatemala - Seguridad de sistemas integrados
Colombia - Seguridad de sistemas integrados
México - Seguridad de sistemas integrados
Panama - Seguridad de sistemas integrados
Peru - Seguridad de sistemas integrados
Uruguay - Seguridad de sistemas integrados
Venezuela - Seguridad de sistemas integrados
Polska - Embedded Systems Security
United Kingdom - Embedded Systems Security
South Korea - Embedded Systems Security
Pakistan - Embedded Systems Security
Sri Lanka - Embedded Systems Security
Bulgaria - Embedded Systems Security
Bolivia - Seguridad de sistemas integrados
Indonesia - Embedded Systems Security
Kazakhstan - Embedded Systems Security
Moldova - Embedded Systems Security
Morocco - Embedded Systems Security
Tunisia - Embedded Systems Security
Kuwait - Embedded Systems Security
Oman - Embedded Systems Security
Slovakia - Embedded Systems Security
Kenya - Embedded Systems Security
Nigeria - Embedded Systems Security
Botswana - Embedded Systems Security
Slovenia - Embedded Systems Security
Croatia - Embedded Systems Security
Serbia - Embedded Systems Security
Bhutan - Embedded Systems Security