Barr Group FacebookBarr Group TwitterBarr Group LinkedInBarr Group Vimeo

Course Length: 
2 Days

The development of security-hardened embedded systems is a challenge. Vulnerabilities in products ranging from medical devices to industrial control systems and automobiles are being exploited by attackers. However, these systems can be (re)secured by following a variety of best practices.

This in-depth two-day training gives you the skills to harden your embedded system to prevent vulnerabilities and detect the most popular types of attacks.


  • Embedded systems designers
  • Technical managers


The following outline is provided as a summary of the major course topics and should not be taken as literally the section-by-subsection lecture breakdown.

  • Introduction
    • A Brief History of Embedded Systems Attacks
    • Uniquely Embedded Concerns
    • Reliability as Security
    • Weakest Link Principle
    • Proper Role of Obscurity
    • Sources of Entropy
  • Threat Assessment
    • Attackers and Assets
    • Attack Surface
    • Attack Trees
    • Security Policy
  • Protecting Data at Rest
    • Introduction
    • Block Ciphers
    • Cipher Modes
    • Hashes
    • Message Authentication Codes
  • Protecting Data in Motion
    • Public-Key Cryptography
    • Secure Protocols
    • SSL/TLS
    • Other Considerations
  • Defenses in Software
    • Common Firmware Vulnerabilities
    • Defensive Software Architectures
    • Defensive Hardware Interfacing
  • Wrap-up and Discussion


Attendees should have prior experience in the design of one or more embedded systems.

Find out More

To find out more about our upcoming public trainings, go to our Training Calendar.

Contact Us to find out more about this course or to enquire about an on-site training at your company.

Recording Policy

All Barr Group Training Public and On-site courses may not be videotaped or photographed without consent from Barr Group's executive team.