This course will likewise instruct understudies how to examine, turn around, troubleshoot, and abuse embedded RTOS firmware. Hands-on involvement with an assortment of certifiable gadgets, RTOS's, and designs outfit understudies with the pragmatic information and abilities important to be capable in RTOS helplessness investigation and misuse.
Who Should Attend:
Product/process designers and engineers
Developers working with embedded systems
Information security professionals
Application developers
Takeaways from this course include:
Examining how to cybersecurity fit in the embedded systems
Fundamentals of Cybersecurity
Fundamentals of Embedded Systems
Fundamentals of embedded system product design cycle, project management, design for production, V&V and O&M
Embedded Systems Security Requirements
Fundamentals of hardware and firmware analysis and design in embedded design
Vulnerabilities in embedded systems
Embedded hardware and firmware analysis to detect vulnerabilities
Foundation knowledge of cyber security threats, risks, mitigation strategies applied to embedded systems
Exploitable vulnerabilities in embedded systems and techniques and strategies for systems engineering embedded systems
Communication protocols, wired and wireless networks, information and network attacks and their impact on embedded devices
Risk assessment techniques and methodologies and using defensive tools for mitigating risk and vulnerabilities
Learn more
Cybersecurity Applied to Embedded Systems
Comments
Post a Comment