Download presentation
Presentation is loading. Please wait.
1
Cyber Security Applied To Embedded Systems Call Us Today: +1-972-665-9786 https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/ TAKE THIS COURSE Since 1993, Tonex has specialized in providing industry-leading training, courses, seminars, workshops, and consulting services. Fortune 500 companies certified.
2
Since 1993, Tonex has specialized in providing industry-leading training, courses, seminars, workshops, and consulting services. Why Tonex ? --Presenting highly customized learning solutions is what we do. For over 30 years TONEX has worked with organizations in improving their understanding and capabilities in topics often with new development, design, optimization, regulations and compliances that, frankly, can be difficult to comprehend. --Ratings tabulated from student feedback post-course evaluations show an amazing 98 percent satisfaction score. --Reasonably priced classes taught by the best trainers is the reason all kinds of organizations from Fortune 500 companies to government’s most important agencies return for updates in courses and hands-on workshops
3
TAKE THIS COURSE Audience: 2-day course designed for : “Product/process designers and engineers Developers working with embedded systems Information security professionals Application developers” Price: $1,999.00 Length: 2 Days Cyber Security Applied to Embedded Systems https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/
4
Cyber Security Applied to Embedded Systems Training is a 2-day training talks about basics of embedded systems and uses of Cyber Security to show exceptional vulnerabilities that are usually misused. find out about strategies and methods considering cyber security measures in the whole framework life cycle and obtaining. Secure Embedded Systems incorporate numerous methodology, strategies and procedures to flawlessly coordinate cyber security inside embedded framework programming. Added security segments to embedded systems can block a framework's usefulness and effect the continuous execution of the mission basic systems. Framework architects, engineers and examiners require an all around characterized approach for all the while outlining embedded usefulness and cyber security. TAKE THIS COURSE Cyber Security Applied to Embedded Systems https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/
5
TAKE THIS COURSE Cyber Security Applied to Embedded Systems https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/ This course will likewise train understudies how to examine, turn around, investigate, and abuse embedded RTOS firmware. Hands-on involvement with an assortment of true gadgets, RTOS's, and designs furnish understudies with the down to earth information and aptitudes important to be capable in RTOS defenselessness examination and misuse. We will examine chance evaluation philosophies, disappointment examination and utilizing protective tools to moderate cyber hazard and vulnerabilities. To guarantee effective mission control framework execution, embedded systems, for example, weapon systems, rockets, shrewd weapons, Network Enabled Weapons (NEW), UAVs, correspondences systems, mechanical control systems, medicinal gadgets, apply autonomy, brilliant matrix, SCADA, Intelligent Electronic Devices (IED), PLCs, and autonomous autos must be anchored to play out their planned capacities, forestall cybeattacks, and work with no cyberattack affect. Cyber Security Applied to Embedded Systems acquaints cybersecurity ideas applied with embedded systems, firmware, equipment and embedded programming. This course is intended for anybody keen on cybersecurity, investigation, abusing, and fixing vulnerabilities with true embedded systems.
6
TAKE THIS COURSE Cyber Security Applied to Embedded Systems https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/
7
TAKE THIS COURSE Cyber Security Applied to Embedded Systems https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/ Takeaways from this course include: Examining how to cybersecurity fit in the embedded systems Fundamentals of Cybersecurity Fundamentals of Embedded Systems Fundamentals of embedded system product design cycle, project management, design for production, V&V and O&M Embedded Systems Security Requirements Fundamentals of hardware and firmware analysis and design in embedded design Vulnerabilities in embedded systems Embedded hardware and firmware analysis to detect vulnerabilities Foundation knowledge of cyber security threats, risks, mitigation strategies applied to embedded systems Exploitable vulnerabilities in embedded systems and techniques and strategies for systems engineering embedded systems Communication protocols, wired and wireless networks, information and network attacks and their impact on embedded devices Risk assessment techniques and methodologies and using defensive tools for mitigating risk and vulnerabilities
8
TAKE THIS COURSE Cyber Security Applied to Embedded Systems https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/
9
TAKE THIS COURSE Cyber Security Applied to Embedded Systems https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/ Course Topics: Cybersecurity 101 Introduction to Embedded Systems Embedded System Vulnerability Analysis Exploiting Real Time Operating Systems Securing Embedded Systems Interfaces and Protocols Cybersecurity Attacks and Best Mitigation Practices for Embedded Systems Case Study and Workshop
10
TAKE THIS COURSE Cyber Security Applied to Embedded Systems https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/
11
TAKE THIS COURSE Cyber Security Applied to Embedded Systems https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/ Cybersecurity 101 What is Cybersecurity? Basic principles of CIA Confidentiality Embedded system’s critical information Application code and surveillance data Unauthorized entities and Integrity Availability and mission objectives Cyber Risks applied to Embedded Systems Principles and practices designed to safeguard your embedded system Hacking tools and entry points Encryption and authentication, Data Integrity Vulnerability analysis 101 and Mitigation 101 Networking and network attacks Role of wireless networks in the embedded systems Embedded hardware and firmware analysis and reverse engineering Embedded system security Threats Intrusion and Virus, Worm, Trojan Horse (Malware) Spyware, DoS and Secure software fundamentals
12
TAKE THIS COURSE Cyber Security Applied to Embedded Systems https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/ Introduction to Embedded Systems Embedded Systems 101 Hardware Architecture Software Development Microprocessor Primer Basic architecture Programmer’s view Embedded Operating Systems Case Study: Embedded mmWave Radar System Embedded Systems Engineering
13
TAKE THIS COURSE Cyber Security Applied to Embedded Systems https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/ Embedded System Vulnerability Analysis Networking and network attacks Wireless networks and embedded systems Embedded hardware and firmware analysis Exploiting Embedded Devices The stages of router exploitation Initial Reconnaissance and Exploitation Firmware Unpacking and Modification Detecting, Extracting and Analysis Cross Compiling Modification and Creation of new firmware Persistent Dynamic Backdoor Firmware analysis and extraction Finding and exploiting logic flaws Firmware emulation and debugging Finding and exploiting real-world overflows Foundations of cyber security and emerging threats Hacking/exploitation techniques, tools and entry points Defensive technologies: Encryption and authentication
14
TAKE THIS COURSE Cyber Security Applied to Embedded Systems https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/
15
TAKE THIS COURSE Cyber Security Applied to Embedded Systems https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/ Exploiting Real Time Operating Systems Basic introduction to the concept of Real Time Operating Systems Overview of MIPS architecture and design Firmware analysis of our first target device Debugging our first target device Augmenting IDA’s auto analysis Searching for backdoors How not to crash your target Hardware & firmware analysis Identifying functions without a symbol table Low-hanging crypto Breaking custom crypto Practical exploitation of crypto bugs More firmware analysis Augmenting IDA’s auto analysis Chip backdoors and Hidden manufacturer menus Hardware Hacking, Basic electronics and circuit analysis Analog/digital communications Common inter-component protocols
16
TAKE THIS COURSE Cyber Security Applied to Embedded Systems https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/ Securing Embedded Systems Interfaces and Protocols Embedded Systems Communication Protocols Universal Asynchronous Receiver/Transmitter (UART) Serial Peripheral Interface (SPI) Joint Test Action Group (JTAG) Inter-integrated Circuit (I2C) I2C bus, CAN bus and FireWire bus USB and Parallel protocols PCI bus and ARM bus Wireless protocols IrDA Bluetooth and Bluetooth LE (BLE) IEEE 802.11 NFC and RFID 802.15.4 6LowPAN and Thread Zigbee Z-Wave
17
TAKE THIS COURSE Cyber Security Applied to Embedded Systems https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/
18
TAKE THIS COURSE Cyber Security Applied to Embedded Systems https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/ Cybersecurity Attacks and Best Mitigation Practices for Embedded Systems Non-Invasive Hardware Reverse Engineering Component identification Tracking PCB traces Re-producing schematic and block diagrams Bus Sniffing Interface Analysis Communications protocols sniffing Decoding and deciphering captured bits Critical data identification and detection Component removal and replacement Dealing with surface mount components Electronics and circuit analysis Understanding your tools and their effects on the circuit Understanding the circuit and its effect on your tools Security Measures
19
TAKE THIS COURSE Cyber Security Applied to Embedded Systems https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/ Case Study and Workshop Cybersecurity Analysis of Embedded Systems used in unmanned aircraft system (UAS) Design Process Embedded system CONOPS Mission objectives CONOPS Test and evaluation Functional requirements Threat analysis and System design Security requirements Performance evaluation Security evaluation System Implementation Security Attack surface, Boot process, system data, and software Physical attack surface and Root of trust establishment Trust hardware and software components, Trusted platform module (TPM) Operating system (OS) and Mission-specific application code (Apps) Field-programmable gate array (FPGA) BIOS, Boot process, Startup and Trusted computing base (TCB)
20
TAKE THIS COURSE Cyber Security Applied to Embedded Systems https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/
21
TAKE THIS COURSE Price: $1999.00 Length: 2 Days https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/ Cyber Security Applied To Embedded Systems
22
Contact Tonex Training Expert Dallas, TX: 1400 Preston Rd., Suite 400 Plano, Texas 75093 Tel: +1-972-665-9786 Washington, DC: 1025 Connecticut Ave, NW Suite 1000 Washington, DC 20036 Tel: +1-202-327-5404 International: +1-214-762-6673 Fax: +1-972-692-7492 Visit Tonex website https://www.tonex.com/
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.