• Online, Instructor-Led
Course Description

Cybersecurity in Autonomous and Semi-Autonomous Systems is a 3-day specialized program focuses on vulnerabilities in autonomous and semi-autonomous systems, embedded systems, tools, techniques, strategies and procedures to analyze and design. This training also explores how manufacturers, suppliers and authorities can detect and respond to cyberattacks, unauthorized intrusions and false and spurious messages or vehicle control demands.

Case studies and workshops will teach techniques and methodologies for assessing risk, reverse engineering, analyzing and integrating defensive tools for mitigating risk throughout the acquisition and product life cycle. Also, participants will be introduced to modern automotive in-vehicle communication networks, the CAN communications protocol and the OBD-II interface threat models, hacking into the OBD-II diagnostics interface, ECU cracking and vehicle network cyber penetration testing. The course will cover existing in-vehicle communication protocols and associated vulnerabilities as well as the limitations of existing digital forensics.

Learning Objectives

  • Understand the fundamental concepts of cybersecurity in the context of autonomous and semi-autonomous systems.

  • Identify potential security threats and vulnerabilities specific to autonomous and semi-autonomous systems.

  • Learn techniques for risk assessment and management in the deployment of autonomous systems.

  • Explore encryption and authentication methods to ensure the security of communication in autonomous systems.

  • Understand the role of machine learning and artificial intelligence in enhancing cybersecurity for autonomous systems.

  • Develop skills in implementing security measures to protect autonomous and semi-autonomous systems from cyber attacks.

  • Examine case studies and real-world examples of cybersecurity challenges and solutions in autonomous systems.

  • Collaborate with peers on practical projects to apply cybersecurity principles to autonomous and semi-autonomous system scenarios.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@hq.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.