Enter the email address you used to sign up, and we'll send your username
Enter your username or email address and we'll email you instructions on how to reset your password
This training provides a solid primer for implementing security for embedded systems.
During three days packed with information, you learn concepts applicable to a wide range of Commercial off the shelf (COTS) products such as gaming consoles, IP cameras, routers and diverse IoT
To lay the foundations for understanding embedded systems security, we use a three-step approach. First, you get a solid, technical grasp of the typical components present on an embedded system and the functioning of an embedded system. Next, we look at an embedded system from the perspective of an attacker who aims to compromise the assets. You learn how to identify relevant assets, determine the most likely attack paths and refine this attack path, by discovering tooling available to an
attacker. Finally, we discuss defense principles, the most sophisticated and complex view of an embedded system. Creating a defense strategy requires not only to understand how a system works or how an attacker would compromise an asset but also to have the ability to prioritize defenses according to risk, time,
cost, attack surfaces, etc. Next to the three days of embedded system security training, we offer the possibility to practice your new knowledge and skills on a second, different embedded system. After the training, you can take home this second target and continue learning.
You selected to get the course Embedded System Security Bl... (20191210). Please Login or Signup to get it.