Most AI Pilots Fail to Scale. MIT Sloan Teaches You Why — and How to Fix It
Live Online Classes in Design, Coding & AI — Small Classes, Free Retakes
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn to implement comprehensive security measures for Yocto-built embedded systems through a practical, step-by-step demonstration in this 44-minute conference talk from the Linux Foundation. Follow along as the presenter builds a secure demo system while implementing the official "Making Images More Secure" guidelines from the Yocto Project manual. Discover how to disable Yocto's non-secure default settings, create device-specific credentials, and implement read-only filesystems for enhanced protection. Master techniques for running services with non-root privileges, utilizing systemd's capabilities to create restricted service environments, and applying security-focused compilation flags. Explore kernel and userspace hardening features while learning to identify, check, and remediate security vulnerabilities in your embedded systems. Gain hands-on experience with the meta-security layer and see practical demonstrations of deploying its security-enhancing features in real-world scenarios.
Syllabus
Securing a Yocto Built System - Michael Opdenacker, Root Commit
Taught by
Linux Foundation