Best Practices for Designing Safe & Secure Embedded Systems
About this Course
|Course Type||Course Code||Duration|
|Embedded Software||BSEMB1025||2 Days|
The development of security-hardened embedded systems is a challenge. Vulnerabilities in products ranging from medical devices to industrial control systems and automobiles are being exploited by attackers. However, these systems can be (re)secured by following a variety of best practices. This in-depth two-day training gives you the skills to harden your embedded system to prevent vulnerabilities and detect the most popular types of attacks.
Why Attend this Course?
What Makes this Course Stand Apart?
What you will Learn?
Embedded system design engineers and their managers
Experience in the design of embedded systems
A Brief History of Embedded Systems Attacks
Uniquely Embedded Concerns
Reliability as Security
Security as Arms Race
Cryptography in a Nutshell
Weakest Link Principle
Proper Role of Obscurity
Sources of Entropy
Attackers and Assets
Disassembly and Reverse Engineering
Protecting Data at Rest
Message Authentication Codes
Protecting Data in Motion
TCP/IP and Sockets
Converting an Unsecured Application
Defenses in Software
Common Firmware Vulnerabilities
Defensive Software Architectures
Defensive Hardware Interfaces
Defenses in Hardware
Securing External Memory
JTAG/Debug Port Considerations
Other Physical Attack Vectors
Logging Tamper Events
Wrap-up and Discussion
What next- How do I arrange a group course or book a public place.?
We are here to help so please utilise our live chat team
Call to speak to your account manager or a consultant on
+44 (0)345 467 9557 or email firstname.lastname@example.org
We are all technical with a wealth of Learning & Development experience
so can talk you through any specific requirements or the details of
one of our courses.