Barr Group FacebookBarr Group TwitterBarr Group LinkedInBarr Group Vimeo

Course Overview

Course Length: 
2 Days
CEUs: 
1.5
Format: 
Lecture

The development of security-hardened embedded systems is a challenge. Vulnerabilities in products ranging from medical devices to industrial control systems and automobiles are being exploited by attackers. However, these systems can be (re)secured by following a variety of best practices.

This in-depth two-day training gives you the skills to harden your embedded system to prevent vulnerabilities and detect the most popular types of attacks.  

Syllabus

The following is a summary of the major course topics and should not be considered the section-by-subsection lecture breakdown.

  • Introduction
    • A Brief History of Embedded Systems Attacks
    • Uniquely Embedded Concerns
    • Reliability as Security
    • Weakest Link Principle
    • Proper Role of Obscurity
    • Sources of Entropy
  • Threat Assessment
    • Attackers and Assets
    • Attack Surface
    • Attack Trees
    • Security Policy
  • Protecting Data at Rest
    • Introduction
    • Block Ciphers
    • Cipher Modes
    • Hashes
    • Message Authentication Codes
  • Protecting Data in Motion
    • Public-Key Cryptography
    • Secure Protocols
    • SSL/TLS
    • Other Considerations
  • Defenses in Software
    • Common Firmware Vulnerabilities
    • Defensive Software Architectures
    • Defensive Hardware Interfacing
  • Wrap-up and Discussion

Audience

  • Embedded systems designers
  • Technical managers

Prerequisites

Attendees should have prior experience in the design of one or more embedded systems.

Related Courses

Upcoming Sessions

Date(s) Location PRICE Register
Nov 30 to Dec 1
Best Practices for Designing Secure Embedded Systems
Munich, Bayern, Germany 1499,00 € *
Inquire

Find out More

To find out more about our upcoming public trainings, go to our Training Calendar.

Contact Us to find out more about this course or to enquire about an on-site training at your company.

Recording Policy

All Barr Group Training Public and On-site courses may not be audiotaped, videotaped or photographed without consent from Barr Group's executive team.  Barr Group reserves the right to record portions or all of a training course for instructional purposes.  As a result, attendees present may also appear on the recording.