Course Code: autocybers
Duration: 35 hours
Prerequisites:

This is a bespoke offer for Automotive Cybersecurity.

Overview:

___ is ___.

This instructor-led, live training (online or onsite) is aimed at beginner-level / intermediate-level / advanced-level ___ who wish to use ___ to ___.

By the end of this training, participants will be able to:

  • Install and configure ___.
  • ___. 
  • ___. 
  • ___. 

Format of the Course

  • Interactive lecture and discussion.
  • Lots of exercises and practice.
  • Hands-on implementation in a live-lab environment.

Course Customization Options

  • To request a customized training for this course, please contact us to arrange.
Course Outline:

Security Fundamentals
• Security Pillars: The CIA Triad (Confidentiality, Integrity, Availability)
• Symmetric Encryption (concepts, algorithms)
• Asymmetric Encryption/Public Key Encryption (concepts, algorithms)
• Efficient Encryption Design (considering resource limitations in vehicles)
• Hashing (concepts, functions)
• Hashing Vs Encryption (distinguishing purposes)
• Digital Signature (concepts, algorithms)
• Signature Vs Encryption (differentiating functionalities)
• Signature & Encryption Together (practical applications)

Digital Certificates and PKI
• Digital Certificates (purpose, structure)
• Verification of Digital Certificates (chain of trust)
• Generation & Structure of Digital Certificates (issuers, subjects, validity)
• Hierarchy of CA (Certificate Authority) (root CA, intermediate CA, types)
• Functions of CA (issuing, revoking, managing certificates)
• Anatomy of PKI (Public Key Infrastructure)

Automotive Network Security
• Gateway ECU (functions, role in communication)
• Automotive Network Topology (CAN bus, Ethernet)
• Safety Vs Security (differentiating goals, potential conflicts)

AUTOSAR and Security
Features
•Introduction to AUTOSAR (architecture, benefits)
•AUTOSAR COM Stack (communication functionalities)
•AUTOSAR Diagnostic Stack (diagnostic communication)
•AUTOSAR Crypto Stack (cryptographic services for automotive applications)
• Crypto Drivers (hardware-specific implementations)
Hardware Security Module (HSM)
•Introduction to HSM (purpose, functionalities)
•HSM integration
• Hardware Protection (techniques for memory protection)
• Secure Storage Area (dedicated area for sensitive data)
SecOC Deep Dive
• SecOC Message Transmission in Vehicle Bus (communication flow)
• SecOC Message Format (structure of messages)
• Types of Freshness Value (ensuring message integrity)
• SecOC Functional Overview (authentication, encryption functionalities)
• Transmission Flow (detailed steps)
• Reception of SecOC Messages (verification process)
Additional Security Features
•IdsM [Intrusion Detection System Manager] (concept, functionalities)
•FVM [Freshness Value Manager] (management of freshness values)
•Authentication Service 0x29 [UDS 2020] (secure authentication in diagnostics)
•Secure Diagnostic (protecting diagnostic communication)
•Secure Access in Automotive Diagnostic (access control mechanisms)
Secure Boot and Flashing
•KeyM (Key Manager) cryptographic keys generation, distribution, storage, usage, and deletion
•Secure Flashing (protecting software updates)
•Secure Booting& Authenticated Booting (ensuring system integrity at startup)