Best Practices for Securing Embedded Systems
Short course
Inhouse
Description
-
Type
Short course
-
Level
Intermediate
-
Methodology
Inhouse
-
Duration
2 Days
-
Start date
Different dates available
The development of security-hardened embedded systems is a challenge. Vulnerabilities in products ranging from medical devices to industrial control systems and automobiles are being exploited by attackers. However, these systems can be (re)secured by following a variety of best practices. This in-depth two-day training gives you the skills to harden your embedded system to prevent vulnerabilities and detect the most popular types of attacks.
Facilities
Location
Start date
Start date
About this course
Embedded system design engineers and their managers
Experience in the design of embedded systems
Reviews
This centre's achievements
All courses are up to date
The average rating is higher than 3.7
More than 50 reviews in the last 12 months
This centre has featured on Emagister for 6 years
Subjects
- Security
- Network security
- Systems
- Python
- IOS
- IoT
- Embedded programming
- Java security
- Mobile security
- Embedded security
Teachers and trainers (1)
Bright Solutions
Trainer
Course programme
#text-block-10 { margin-bottom:0px; text-align:left; }
Introduction
A Brief History of Embedded Systems Attacks
Uniquely Embedded Concerns
Reliability as Security
Security as Arms Race
Cryptography in a Nutshell
Weakest Link Principle
Proper Role of Obscurity
Sources of Entropy
Threat Assessment
Attackers and Assets
Attack Surface
Attack Trees
Security Policy
Disassembly and Reverse Engineering
Protecting Data at Rest
Introduction
Block Ciphers
Cipher Modes
Hashes
Message Authentication Codes
#text-block-11 { margin-bottom:0px; text-align:left; }
Protecting Data in Motion
Public-Key Cryptography
TCP/IP and Sockets
Secure Protocols
TLS/SSL
Converting an Unsecured Application
Other Considerations
Defenses in Software
Common Firmware Vulnerabilities
Defensive Software Architectures
Defensive Hardware Interfaces
Defenses in Hardware
Securing External Memory
JTAG/Debug Port Considerations
Other Physical Attack Vectors
Mechanical Security
Logging Tamper Events
Wrap-up and Discussion
Best Practices for Securing Embedded Systems