• Online, Instructor-Led
Course Description

Cybersecurity Applied to Embedded Systems Training is a 2-day training discusses fundamentals of embedded systems and applications of cybersecurity to illustrate unique vulnerabilities that are commonly exploited. Learn about methods and techniques considering cybersecurity measures in the entire system life cycle and acquisition. Secure Embedded Systems include many procedures, methods and techniques to seamlessly integrate cybersecurity within embedded system software. Added security components to embedded systems can impede a system's functionality and impact the real-time performance of the mission critical systems.


 

Systems engineers, developers and analysts need a well-defined approach for simultaneously designing embedded functionality and cybersecurity. Secure embedded systems might use a security co-processor to cryptographically ensure system confidentiality and integrity while maintaining functionality. This course will also teach participants how to analyze, reverse, debug, and exploit embedded RTOS firmware. Hands-on experience with a variety of real-world devices, RTOS's, and architectures equip students with the practical knowledge and skills necessary to be proficient in RTOS vulnerability analysis and exploitation.

Learning Objectives

  • Understand the fundamentals of embedded systems and their role in various applications.
  • Identify potential cybersecurity threats specific to embedded systems.
  • Learn techniques for secure design and development of embedded systems.
  • Explore common vulnerabilities in embedded systems and effective mitigation strategies.
  • Examine real-world case studies of cybersecurity incidents in embedded systems.
  • Gain hands-on experience in assessing and securing embedded systems.
  • Understand the integration of cryptographic protocols for enhancing security in embedded systems.
  • Explore emerging trends and challenges in cybersecurity for embedded systems.
  • Develop skills in conducting security assessments and audits for embedded systems.
  • Apply best practices for secure coding and firmware development in embedded systems.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@hq.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.