Protect devices in an interconnected world by mastering secure coding in C, applying security-by-design principles, and mitigating risks through threat modeling, IAM, and supply chain safeguards.
Overview
Syllabus
- Architecting with Security in Mind
- Design secure embedded systems by integrating early security measures, threat modeling, and privacy practices to protect sensitive data and prevent potential cyber threats.
- Securing Sensitive Information and IAM
- Explore how to protect sensitive info and implement secure IAM practices, leveraging coding, secure elements, and behavioral measures to prevent unauthorized access and data breaches.
- I/O Sanitization
- Discover how to sanitize I/O in embedded systems, prevent injection attacks, buffer overflows, and secure debugging data while maintaining software security integrity.
- Hardening and Supply Chain Risk Management
- How to harden embed systems by reducing the attack surface through the removal of unused components, implementing secure boot, and gaining visibility into vulnerabilities in third-party libraries.
- TLS and Secure Updates
- Enhance the security of embedded devices by securing their communication, implementing a mechanism for secure OTA updates, and ensuring the integrity and authenticity of the firmware.
- Securing an Embedded System
- You will secure a software system by performing a threat analysis, defining user roles, and hardening the system. You will implement security practices and demonstrate a secure update process.
Taught by
Dennis Kengo Oka and Riccardo Sirigu, CISSP