Security of embedded systems (embedded)
An intensive, three-day training course combining theory and practice in securing embedded systems. The program covers the full cycle of secure software development - from architecture design to deployment and testing. Participants will learn the latest techniques for protecting IoT devices and industrial systems through hands-on workshops and case studies. The training is conducted in an interactive format, with an emphasis on sharing experiences and solving real-world problems.
Issues
-
Industry standards: ISO 26262, IEC 62443
-
Threat modeling for embedded systems
-
Security architecture: from hardware to applications
-
Secure Boot and key management
-
Memory and data protection techniques
-
Implementing cryptography in resource-constrained environments
-
The life cycle of secure software
-
Best practices in writing secure code
-
Analysis of real cases of attacks
-
Protection against physical attacks
-
Security testing methods
Benefits
- The training provides practical knowledge of threats and techniques for protecting embedded systems. The experience gained allows you to independently design security features for embedded devices. Knowledge of cryptography in embedded systems makes it possible to create effective protection mechanisms. The threat modeling and risk analysis techniques learned will improve the process of designing safe solutions. The training develops the ability to create secure code and verify security through penetration testing
Who is this training for?
Prerequisites
- Basic knowledge of embedded systems or general IT security
- Knowledge of at least one programming language (C/C++ preferred)
- General understanding of network concepts and communication protocols
- Basic knowledge of the hardware architecture of computers and microprocessors
- Knowledge of basic concepts of cryptography
Training program
Fundamentals of designing secure embedded systems
- Specifics of threats in different domains (IoT, industrial systems, mobile devices)
- Mechanisms of isolation and compartmentalization
- Managing permissions and access to resources
Secure boot strategies
- Workshop: Designing a security architecture for a selected use case
- Threat analysis strategies for embedded systems
Source code security verification
- Techniques for protecting against common vulnerabilities
- Implementation of intrusion detection mechanisms
Secure error and exception handling
- Workshop: Code security audit and remediation of detected vulnerabilities
- Management of secrets and cryptographic material
Security monitoring and diagnostics
- Detection and protection against hardware attacks
- Secure communication in distributed systems
Incident response procedures
- Workshop: Implementation of mechanisms for secure software updates
Delivery Methods
Online
- Convenience of participating from anywhere
- Interactive live sessions with trainer
- Materials available for 30 days
- No travel costs
On-site
- Direct contact with trainer and group
- Intensive hands-on workshops
- Networking with other participants
- Full focus on learning
Frequently asked questions
What are the prerequisites for this training?
For Security of embedded systems (embedded) we recommend: Basic knowledge of embedded systems or general IT security; Knowledge of at least one programming language (C/C++ preferred); General understanding of network concepts and communication protocols.
What is the format and duration of this training?
The training lasts 3 days and is available in online and on-site format. Sessions run from 9:00 AM to 4:00 PM. We can also customize the schedule to fit your team's needs.
Who is this training designed for?
This training is designed for: Embedded systems engineers looking for cyber security expertise; IT security specialists interested in the specifics of embedded systems; IoT and industrial systems architects.
Request a quote
Funding Options
Check funding options for your company
Development Services Database
Up to 80% funding for SMEs from EU funds
Check availabilityNational Training Fund
Up to 100% funding for employers
Learn moreTrusted by
We train teams at Poland's largest companies
Interested in this training?
Contact us - we'll prepare an offer tailored to your organization's needs.