Skip to main content

+1 866 653-6233 LinkedIn Software Expert Witness Directory

About Us Contact Us

Barr Group Software Experts

Barr Group Software Experts

Main navigation

  • Expert Services
    • Consulting Experts in Software and Electronics
    • Expert Reports by Testifying Software Experts
    • Reverse Engineering and Forensic Analysis
    • Software Source Code Review and Analysis
  • Areas of Expertise
    • Left Side
      • Artificial Intelligence
      • Automotive Systems
      • Cloud Computing
      • Computer Security
      • Consumer Electronics
      • Electronic Circuits
      • Enterprise Software
      • Financial Technology
      • Firmware and IoT
    • Right Side
      • Industrial Controls
      • Mechanical Design
      • Medical Devices
      • Military & Aerospace
      • Mobile Devices & Apps
      • Optical Equipment
      • Renewable Energy
      • Signal Processing
      • Telecommunications
  • Matters & Venues
    • Patent Infringement and Invalidity Experts
    • Software Copyright and Trade Secrets Experts
    • Product Liability and Failure Analysis Experts
    • Contract Disputes and Software Project Failures
    • Venues and Clients
  • Directory
  • Case Studies
    • DirecTV Anti-Piracy
    • Samsung Software Copyright
    • Toyota Runaway Cars
  • Resources
    • Expert Witness Blog
    • Source Code Review in Litigation
    • Software Source Code Discovery

Best Practices for Designing Secure Embedded Devices

  1. Home
  2. Engineering Services
  3. Embedded Software Training Courses
  4. Best Practices for Designing Secure Embedded Devices

Course Overview

Best Practices for Designing Secure Embedded Devices

Course Length
2 Days
CEUs
1.50
Format
Lecture

The development of security-hardened embedded systems is a challenge. Vulnerabilities in products ranging from medical devices to industrial control systems and automobiles are being exploited by attackers. However, these systems can be (re)secured by following a variety of best practices.

This in-depth two-day training gives you the skills to harden your embedded system to prevent vulnerabilities and detect the most popular types of attacks.  

Topics covered during this course include:

  • Introduction to Embedded Systems Security
  • Threat Assessment
  • Protecting Data at Rest
  • Protecting Data in Motion
  • Defenses in Software

This course is appropriate for:

  • Embedded systems designers
  • Technical managers

Prerequisites:  Attendees should have prior experience in the design of one or more embedded systems.

Explore this course:

  • Course Syllabus
  • Reviews
  • Related Courses

Request an Expert

(866) 653-6233

Syllabus

The following is a summary of the major course topics and should not be considered the section-by-subsection lecture breakdown.

Introduction

  • A Brief History of Embedded Systems Attacks
  • Uniquely Embedded Concerns
  • Reliability as Security
  • Weakest Link Principle
  • Proper Role of Obscurity
  • Sources of Entropy

Threat Assessment

  • Attackers and Assets
  • Attack Surface
  • Attack Trees
  • Security Policy

Protecting Data at Rest

  • Introduction
  • Block Ciphers
  • Cipher Modes
  • Hashes
  • Message Authentication Codes

Protecting Data in Motion

  • Public-Key Cryptography
  • Secure Protocols
  • SSL/TLS
  • Other Considerations

Defenses in Software

  • Common Firmware Vulnerabilities
  • Defensive Software Architectures
  • Defensive Hardware Interfacing

Wrap-up and Discussion

Reviews
Related Courses
  • Embedded Security Boot Camp
  • Firmware Defect Prevention for Safety-Critical Systems
  • Top 10 Ways to Design Safer Embedded Software

Find out More

Contact us now to find out more about this course or to enquire about an on-site training at your company.

Recording Policy

Barr Group's courses may not be audiotaped, videotaped, or photographed without consent from Barr Group's executive team.

Barr Group logo
Call us

Expert Services

  • Source Code Review Services
  • Expert Witness Directory
  • Reverse Engineering Services
  • Expert Reports & Testimony
  • How-To Technical Articles
  • Engineering Services

Latest Insights

  • Payment Processing and e-Payments Fraud
  • Albert Einstein Expert Witness
  • Medical Device Litigation and FDA 510(k)
  • Personality Traits of the Best Expert Witnesses

Website contents copyright © 2012-2025 by Barr Group. | Barr Group's logo is a U.S.-registered ® trademark.

SITEMAP  |  PRIVACY