Cybersecurity and Embedded Systems

  • Overview
  • Course Content
  • Requirements & Materials
Overview

Cybersecurity and Embedded Systems

Course Description

Embedded systems offer many opportunities to economically and effectively control large infrastructure systems, small single purpose devices, and many products in between. But their use can also introduce vulnerabilities easily exploited to gain access to valuable data, alter device functionality, or impose other risks. This course will provide an understanding of those unique vulnerabilities in embedded systems that are commonly exploited. Discover techniques and strategies for integrating cybersecurity measures into products from the start. Through hands-on labs, examine emerging threats and learn to think like a hacker to gain the skills necessary to create more secure products. You will learn the best practices to integrate into design processes and raise the level of product security.

Course Content

VULNERABILITIES

  • Assessment of embedded devices
  • Embedded hardware and firmware security
  • Analysis methodology and examples

ATTACKS

  • Networking and network attacks
  • Tactical and industrial wireless attacks

EXPLOITATION

  • Case studies and hands-on labs
Requirements & Materials

Materials

Required

  • Laptop 

Provided

  • Notes and presentation materials

Session Details

  • Special Discounts: Georgia Tech Research Institute (GTRI) employees are eligible to receive a discount.  If you are a GTRI employee, please go to the Organizational Development website and look for the coupon code under GT Professional Development. Review coupon instructions for more information.

Who Should Attend

This course is designed for product/process designers and engineers using embedded systems, information security professionals, and application developers.

Coding boot camp professional working on laptop

What You Will Learn

  • Foundations of cyber security and emerging threats
  • Hacking/exploitation techniques, tools, and entry points
  • Encryption and authentication defensive technologies
  • Wireless networks and embedded systems
  • Embedded hardware and firmware analysis
  • Secure software practices
  • Integrating security into the design process
Cybersecurity professional working on computer

How You Will Benefit

  • Develop a foundational knowledge of cybersecurity threats and strategies for mitigating risk.
  • View your products from the perspective of the “hacker,” identifying exploitations and exploring how tools are used to gain entry into seemingly secure environments.
  • Examine wired and wireless networks, network attacks, and their impact on devices.
  • Develop skills for analyzing and addressing vulnerabilities in products with embedded systems.
  • Analyze embedded hardware and firmware to detect vulnerabilities and opportunities for improving security.
  • Identify and apply best practices, skills, and techniques for integrating security into the design process from the start.
  • Grow Your Professional Network icon
    Grow Your Professional Network
  • Taught by Experts in the Field icon
    Taught by Experts in the Field

The course schedule was well-structured with a mix of lectures, class discussions, and hands-on exercises led by knowledgeable and engaging instructors.

- Abe Kani
President

TRAIN AT YOUR LOCATION

We enable employers to provide specialized, on-location training on their own timetables. Our world-renowned experts can create unique content that meets your employees' specific needs. We also have the ability to deliver courses via web conferencing or on-demand online videos. For 15 or more students, it is more cost-effective for us to come to you.

  • Save Money
  • Flexible Schedule
  • Group Training
  • Customize Content
  • On-Site Training
  • Earn a Certificate
Learn More