Best Practices for Securing Embedded Systems

Short course

Inhouse

£ 2001-3000

Description

  • Type

    Short course

  • Level

    Intermediate

  • Methodology

    Inhouse

  • Duration

    2 Days

  • Start date

    Different dates available

Business Group Bookings Only

The development of security-hardened embedded systems is a challenge. Vulnerabilities in products ranging from medical devices to industrial control systems and automobiles are being exploited by attackers. However, these systems can be (re)secured by following a variety of best practices. This in-depth two-day training gives you the skills to harden your embedded system to prevent vulnerabilities and detect the most popular types of attacks.

Facilities

Location

Start date

Inhouse

Start date

Different dates availableEnrolment now open

About this course

Embedded system design engineers and their managers

Experience in the design of embedded systems

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

This centre's achievements

2018

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 6 years

Subjects

  • Security
  • Network security
  • Systems
  • Python
  • IOS
  • IoT
  • Embedded programming
  • Java security
  • Mobile security
  • Embedded security

Teachers and trainers (1)

Bright  Solutions

Bright Solutions

Trainer

Course programme


#text-block-10 { margin-bottom:0px; text-align:left; }

Introduction
A Brief History of Embedded Systems Attacks
Uniquely Embedded Concerns
Reliability as Security
Security as Arms Race
Cryptography in a Nutshell
Weakest Link Principle
Proper Role of Obscurity
Sources of Entropy
Threat Assessment
Attackers and Assets
Attack Surface
Attack Trees
Security Policy
Disassembly and Reverse Engineering
Protecting Data at Rest
Introduction
Block Ciphers
Cipher Modes
Hashes
Message Authentication Codes

#text-block-11 { margin-bottom:0px; text-align:left; }

Protecting Data in Motion
Public-Key Cryptography
TCP/IP and Sockets
Secure Protocols
TLS/SSL
Converting an Unsecured Application
Other Considerations
Defenses in Software
Common Firmware Vulnerabilities
Defensive Software Architectures
Defensive Hardware Interfaces
Defenses in Hardware
Securing External Memory
JTAG/Debug Port Considerations
Other Physical Attack Vectors
Mechanical Security
Logging Tamper Events
Wrap-up and Discussion

Best Practices for Securing Embedded Systems

£ 2001-3000