Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
- Differences between general security and embedded systems security.
Characteristics of Embedded Application Security
- Embedded network transactions.
- Automotive security.
- Android devices.
- Next-generation software-defined radio.
Critical Aspects of an Embedded System
- Microkernel vs. monolithic architectures.
- Independent security levels.
- Core security requirements.
- Access control mechanisms.
- I/O virtualization.
Performing Threat Modeling and Assessment
- Identifying attackers and assets.
- Analyzing attack surfaces.
- Constructing attack trees.
- Establishing a security policy.
Developing Secure Embedded Software
- Principles of secure coding.
- Secure program design.
- Minimal implementation.
- Component architecture.
- Principle of least privilege.
- Secure development process.
- Independent expert validation.
- Model-driven design.
- Code review and static analysis.
- Security testing.
- Peer code reviews.
Understanding and Implementing Cryptography
- Cryptographic modes.
- Cryptographic hashes.
- Cryptographic certifications.
- Key management.
- Block ciphers.
- Message Authentication Codes.
- Random Number Generation.
Data Protection
- Data-in-motion protocols.
- Securing data in motion.
- Data-at-rest protocols.
- Securing data at rest.
Mitigating Attacks
- Common software attacks.
- Preventing side-channel attacks.
Retrofitting Security in Existing Projects
- Securing bootloaders and firmware updates.
Summary and Next Steps
Requirements
- Experience with embedded systems development.
Target Audience
- Professionals working with embedded systems.
- Security specialists.
21 Hours
Testimonials (2)
The oral skills and human side of the trainer (Augustin).
Jeremy Chicon - TE Connectivity
Course - NB-IoT for Developers
Very knowledgeable trainer, was able to adjust to audience knowledge, excellent industry experience and ability to relate to audience needs Excellent content preparation , tailored to needs discussed beforehand. Good supplement reading materials prepared by trainer