Experience Embedded

Professional Training, Consulting and Project Support

Security Fundamentals for Embedded Systems - Face-to-Face Training

  • Content
     
  • Objectives
     
  • Participants
     
  • Requirements
     

You get familiar with structured and efficient Security by Design, learn how to identify potential security vulnerabilities in embedded systems and how to suitably assess and eliminate those vulnerabilities. This includes the most essential kryptographic processes and their application as well as specific hardware and software concepts. You know the details of ISO/SAE 21434 and can comply with the related requirements.

Your benefit:

Jump-start into the security topic with compact knowledge

Functional security (safety) context

Details on ISO/SAE 21434

Exercises covering the different phases of the security lifecycle

Training documentation on USB stick/ download as compendium

Hardware and software architects, hardware and software developers, test engineers, project managers, system engineers

Experience with embedded systems as well as basic safety knowledge of are an advantage.

Threats and Attack Scenarios

  • Security incidents
  • Terms and definitions
  • Vulnerability databases
  • Impacts
  • Classes of attackers
  • Case study
  • Defense in depth
  • Security process/ mindset/ design
  • Security development lifecycle (SDL)
  • Threat models

Risks and Efforts

  • Classic risk management
  • Security risk management
  • Threat analysis and risk assessment TARA
  • IT security risk assessment
  • Examples of TARA methods

Generic Application of Countermeasures

  • Security attributes
  • Cryptography (symmetric, asymmentric, hash, MAC, signatures)
  • Example of memory encryption
  • Security modules (SHE, HSM, TPM)
  • CPU core security
  • Secure software
  • Security testing

Selected Vulnerabilities and Countermeasures

  • Code injection
  • Code reuse
  • Countermeasures
  • Boundary error vulnerabilities
  • Side channel attacks
  • Debug interface aspects

Norms and Standards

  • References
  • Extracts from IEC 62443

Security in Safety Context

  • Differences and similarities
  • Security in safety norms

Cybersecurity Engineering

  • ISO/SAE 21434:2021
  • Exercises: headlamp system

The training price includes:
Lunch, drinks, training documentation and your training certificate.


ALL INCLUSIVE!

Related trainings

Functional Safety (FuSa) of Electronics and Software According to IEC 61508 and ISO 26262 - Face-to-Face Training
Training code: E-SAFETY

ISO SAE 21434 Road Vehicles - Cybersecurity Engineering - Face-to-Face Training
Training code: E-21434


Related trainings

FACE-TO-FACE TRAINING

DatePrice *Duration
02.09. – 03.09.20241.500,00 €2 days 
Training code: E-SECFUSI
* Price per attendee, in Euro plus VAT
> Registration form download (PDF)> Training details as PDF

Onsite Training

Our customized workshops integrate your specific project tasks in our training content and accommodate your requirements on content, time, location, duration, technical environment and knowledge transfer methodology.

Please contact us for further information or an individual quotation.

> Training details as PDF

Face-To-Face - German

Date Duration
02.09. – 03.09.2024 2 days  

Live Online - German

Date Duration
02.05. – 03.05.2024 2 days  
27.01. – 28.01.2025 2 days  

Coaching

Our coaching services offer a major advantage: our specialists introduce their expertise and experience directly in your solution process, thus contributing to the success of your projects.

We will be happy to provide you with further information or submit a quotation tailored to your requirements.

Security Fundamentals for Embedded Systems - Face-to-Face Training

Content

Threats and Attack Scenarios

  • Security incidents
  • Terms and definitions
  • Vulnerability databases
  • Impacts
  • Classes of attackers
  • Case study
  • Defense in depth
  • Security process/ mindset/ design
  • Security development lifecycle (SDL)
  • Threat models

Risks and Efforts

  • Classic risk management
  • Security risk management
  • Threat analysis and risk assessment TARA
  • IT security risk assessment
  • Examples of TARA methods

Generic Application of Countermeasures

  • Security attributes
  • Cryptography (symmetric, asymmentric, hash, MAC, signatures)
  • Example of memory encryption
  • Security modules (SHE, HSM, TPM)
  • CPU core security
  • Secure software
  • Security testing

Selected Vulnerabilities and Countermeasures

  • Code injection
  • Code reuse
  • Countermeasures
  • Boundary error vulnerabilities
  • Side channel attacks
  • Debug interface aspects

Norms and Standards

  • References
  • Extracts from IEC 62443

Security in Safety Context

  • Differences and similarities
  • Security in safety norms

Cybersecurity Engineering

  • ISO/SAE 21434:2021
  • Exercises: headlamp system