Course
[TRIAL] Fault Injection and Countermeasures for Software Developers (NEWFI4DEVTRIAL)
Trial
[TRIAL] Fault Injection and Countermeasures for Software Developers (NEWFI4DEVTRIAL)
Fault Injection attacks are implementation attacks designed to influence the intended behavior of a device or application by changing a critical value or by changing the flow of a program. Faults can be used to exploit or bypass robust security...
[TRIAL] Side Channel Analysis and Countermeasures for Software Developers (NEWSCA4DEVTRIAL)
Trial
[TRIAL] Side Channel Analysis and Countermeasures for Software Developers (NEWSCA4DEVTRIAL)
From an information security perspective, protecting sensitive data requires utilizing algorithms which resist theoretical attacks. However, treating an algorithm in a purely mathematical fashion or in other words abstracting away from its...
Secure Coding Fundamentals (NEWSCF)
€750.00
Online training
Secure Coding Fundamentals (NEWSCF)
Secure Coding Fundamentals is an online, highly interactive course where we build on the tips and tricks used by software security analysts to review large code bases. Learn how to eliminate logical errors, protect crypto algorithms against Side...
Automotive Security Architect (ONLINEASA)
€900.00
Online training
Automotive Security Architect (ONLINEASA)
An automotive E/E solution that does not protect from an adversarial action cannot be considered state-of-the-art. Breached security of a safety-critical component leads to potential liability and may result in a costly delay in production...
Designing Secure Bootloaders (ONLINEDSB)
€1,200.00
Online training
Designing Secure Bootloaders (ONLINEDSB)
Most embedded devices have strong requirements on the integrity of the code running on the platform. Nevertheless, attackers are constantly coming up with new ways to compromise a system. For these reasons, a robust secure boot implementation...
[TRIAL] Designing Secure Bootloaders (ONLINEDSBTRIAL)
Trial
[TRIAL] Designing Secure Bootloaders (ONLINEDSBTRIAL)
Most embedded devices have strong requirements on the integrity of the code running on the platform. Nevertheless, attackers are constantly coming up with new ways to compromise a system. For these reasons, a robust secure boot implementation...
HCE Security Masterclass (ONLINEHCE)
€925.00
Online training
HCE Security Masterclass (ONLINEHCE)
Industry partner of choice for mobile security certification and training Are you developing and aiming to certify a mobile payment solution? The content of this training is a distilled version of the lessons learned by our security...
[TRIAL] Memory Corruption Essentials (ONLINEMCETRIAL)
Trial
[TRIAL] Memory Corruption Essentials (ONLINEMCETRIAL)
This course provides a thorough guide to memory corruption issues. We cover arbitrary writes, the most severe type of memory corruption vulnerabilities, the classic buffer overflows and the subtle off-by-one vulnerability. We discuss the...
Understanding Leakage Detection (ONLINEULD)
Online training
Understanding Leakage Detection (ONLINEULD)
Leakage detection plays an increasingly important role in the security evaluation of cryptographic devices. A particularly popular approach is the Test Vector Leakage Assessment framework proposed by Cryptography Research Inc., which specifies a...
Deep Learning for SCA with Inspector (TOOLSDLSCA)
€750.00
Online training for Inspector users
Deep Learning for SCA with Inspector (TOOLSDLSCA)
Since 2017 several national and private schemes mandate the application of deep learning in side-channel analysis (SCA) evaluations of state-of-the-art secure crypto implementations. Deep learning is an advanced machine learning technique that...

Oh, no. Nothing was found.

Use a different term and try again.