Course
Automotive Security Architect (ONLINEASA)
€900.00
Online training
Automotive Security Architect (ONLINEASA)
An automotive E/E solution that does not protect from an adversarial action cannot be considered state-of-the-art. Breached security of a safety-critical component leads to potential liability and may result in a costly delay in production...
ASA Part 4. Understanding ISO/SAE 21434 changes (ONLINEASA4)
€150.00
Online training
ASA Part 4. Understanding ISO/SAE 21434 changes (ONLINEASA4)
In an easy, concise and informal style we follow the introduction of the new cybersecurity standard ISO/SAE21434 together with the UN ECE regulations. We start off with a comparison between cybersecurity and safety, and discuss who will be...
Designing Secure Bootloaders (software track) (ONLINEDSBSW)
€900.00
Online training
Designing Secure Bootloaders (software track) (ONLINEDSBSW)
Most embedded devices have strong requirements on the integrity of the code running on the platform. Attackers are finding new ways to compromise these systems and a robust secure boot implementation that ensures the software integrity is...
[TRIAL] Designing Secure Bootloaders (video edition) (ONLINEDSBTRIALVIDEO)
Online training
[TRIAL] Designing Secure Bootloaders (video edition) (ONLINEDSBTRIALVIDEO)
Most embedded devices have strong requirements on the integrity of the code running on the platform. Attackers are finding new ways to compromise these systems and a robust secure boot implementation that ensures the software integrity is...
FI for Software Developers (ONLINEFI4DEV)
€450.00
Online training
FI for Software Developers (ONLINEFI4DEV)
Fault Injection attacks are implementation attacks designed to influence the intended behavior of a device or application by changing a critical value or by changing the flow of a program. Faults can be used to exploit or bypass robust security...
[TRIAL] FI for Software Developers (ONLINEFI4DEVTRIAL)
Online training
[TRIAL] FI for Software Developers (ONLINEFI4DEVTRIAL)
Fault Injection attacks are implementation attacks designed to influence the intended behavior of a device or application by changing a critical value or by changing the flow of a program. Faults can be used to exploit or bypass robust security...
HCE Security Masterclass (ONLINEHCE)
€925.00
Online training
HCE Security Masterclass (ONLINEHCE)
Industry partner of choice for mobile security certification and training Are you developing and aiming to certify a mobile payment solution? The content of this training is a distilled version of the lessons learned by our security...
[TRIAL] Memory Corruption Essentials (ONLINEMCETRIAL)
Online training
[TRIAL] Memory Corruption Essentials (ONLINEMCETRIAL)
This course provides a thorough guide to memory corruption issues. We cover arbitrary writes, the most severe type of memory corruption vulnerabilities, the classic buffer overflows and the subtle off-by-one vulnerability. We discuss the...
SCA for Software Developers (ONLINESCA4DEV)
Online training
SCA for Software Developers (ONLINESCA4DEV)
From an information security perspective, protecting sensitive data requires utilizing algorithms which resist theoretical attacks. However, treating an algorithm in a purely mathematical fashion and thus neglecting its physical (hardware or...
Secure Coding Fundamentals (ONLINESCF)
€750.00
Online training
Secure Coding Fundamentals (ONLINESCF)
The Secure Coding Fundamentals is an online, highly interactive course where we build on the tips and tricks used by software security analysts to review large code bases. Learn how to eliminate logical errors, harden critical code areas against...