Secure Embedded Systems incorporate numerous methodology, strategies and procedures to consistently coordinate cyber security inside embedded framework programming and equipment. Added security segments to embedded systems can hinder a framework's usefulness and effect the constant execution of the missions basic systems.
Who Should Attend:
- Product/process designers and engineers
- Developers working with embedded systems
- Information security professionals
- Application developers
- Hackers
Course Materials:
Required: Any Laptop with CD-ROM drive
Provided by the instructor: Lab manuals, Course Notes, Supplementary readings and presentation materials
Course Modules:
- Cybersecurity 101
- Cyber security threats and strategies
- Tools and techniques to mitigate risk
- Tools for exploitation and exploring
- Networking 101
- Embedded Systems 101
- Embedded system security and vulnerability
- Embedded hardware, firmware and software analysis, design and architecture vulnerabilities
- Exploiting Real Time Operating Systems
- Embedded Systems and cybersecurity attacks and mitigation
- Case Study and Workshop
- Embedded systems hacking, exploitation techniques, tools and procedures
- Embedded systems defensive technologies
- Embedded systems vulnerability analysis methodology
- Wireless and wireline networking, vulnerability, exploitation, hacking and attacks
- Embedded hardware, firmware, and software analysis and reverse engineering
- Hands-on labs
Cyber Security and Embedded Systems Training Bootcamp
Comments
Post a Comment