Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Plan Szkolenia
Introduction
- Security vs embedded systems security
Characteristics of Embedded Application Security
- Embedded network transactions
- Automotive security
- Android devices
- Next-generation software-defined radio
Critical Aspects of an Embedded System
- Microkernel vs monolith
- Independent security levels
- Core security requirements
- Access control
- I/O virtualization
Performing Threat Modeling and Assessment
- Attackers and assets
- Attack surface
- Attack trees
- Establishsing a security policy
Developing Secure Embedded Software
- Secure coding principles
- Secure program design
- Minimal Implementation
- Component architecture
- Least privilege
- Secure development process
- Independent expert validation
- Model-driven design
- Code review and static analysis
- Security testing
- Peer code reviews
Understanding and Implementing Cryptography
- Cryptographic modes
- Cryptographic hashes
- Cryptographic certifications
- Managing keys
- Block ciphers
- Message Authentication Codes
- Random Number Generation
Data Protection
- Data-in-motion protocols
- Securing data in motion
- Data-at-rest protocols
- Securing data at rest
Mitigating Attacks
- Common software attacks
- Preventing side-channel attacks
Retrofitting Security in Existing Projects
- Securing bootloaders and firmware updates
Summary and Conclusion
Wymagania
Doświadczenie w tworzeniu systemów wbudowanych.
Grupa docelowa
Specjaliści od systemów wbudowanych
Specjaliści ds. bezpieczeństwa
21 godzin
Opinie uczestników (2)
Duża liczba dodatkowych materiałów (książki, strony internetowe, podcasty), gdzie można szukać dodatkowych informacji
Mateusz Półrola - Mobica Limited Sp. z o.o. Oddział w Polsce
Szkolenie - Embedded Systems Security
Modele bezpieczeństwa, omówienie dobrych praktyk programistycznych, różne rodzaje ataków.