• Online, Instructor-Led
  • Online, Self-Paced
  • Classroom
Course Description

The purpose of this course is to reveal the tools, techniques and procedures (TTPs) employed by adversaries to exploit and subvert the security of embedded systems. This course will cover core concepts and techniques to analyze and characterize the behavior of embedded systems and platforms. Concepts will be introduced and discussed within the context of an adversary intent on altering or subverting the behavior of such systems.

Learning Objectives

Computer Network Defense Infrastructure Support|Knowledge Management|Software Assurance and Security Engineering

Framework Connections