How to manipulate files and directories in a secure manner
Discover how to protect your programs from malicious user input
Secure System Software Consideration
Embedded system hardware features for security
Secure Software Development methodology and framework
Apprehend the context and the use of Hypervisors and System Virtualization
Discover Security checks and Tools
Some programming concepts are desirable (whatever language)
Some cryptography and Linux basics
PDF course material (in English) supplemented by a printed version for face-to-face courses.
Online courses are dispensed using the Teams video-conferencing system.
The trainer answers trainees' questions during the training and provide technical and pedagogical assistance.
Practical activities represent from 40% to 50% of course duration.
Code examples, exercises and solutions
For remote trainings:
One Online Linux PC per trainee for the practical activities.
The trainer has access to trainees' Online PCs for technical and pedagogical assistance.
QEMU Emulated board or physical board connected to the online PC (depending on the course).
Some Labs may be completed between sessions and are checked by the trainer on the next session.
For face-to-face trainings:
One PC (Linux ou Windows) for the practical activities with, if appropriate, a target board.
One PC for two trainees when there are more than 6 trainees.
For onsite trainings:
An installation and test manual is provided to allow preinstallation of the needed software.
The trainer come with target boards if needed during the practical activities (and bring them back at the end of the course).
Downloadable preconfigured virtual machine for post-course practical activities
At the start of each session the trainer will interact with the trainees to ensure the course fits their expectations and correct if needed
Total: 12 hours
2 sessions, 6 hours each
Any embedded systems engineer or technician with the above prerequisites.
The prerequisites indicated above are assessed before the training by the technical supervision of the traineein his company, or by the trainee himself in the exceptional case of an individual trainee.
Trainee progress is assessed in two different ways, depending on the course:
For courses lending themselves to practical exercises, the results of the exercises are checked by the trainer while, if necessary, helping trainees to carry them out by providing additional details.
Quizzes are offered at the end of sections that do not include practical exercises to verifythat the trainees have assimilated the points presented
At the end of the training, each trainee receives a certificate attesting that they have successfully completed the course.
In the event of a problem, discovered during the course, due to a lack of prerequisites by the trainee a different or additional training is offered to them, generally to reinforce their prerequisites,in agreement with their company manager if applicable.
System Software Consideration
The Operating System
Multiple Independent Levels of Security
Core embedded Operating system Security Requirements
Impact of Determinism
Hypervisors and System Virtualization
Introduction to System Virtualization
Applications of System Virtualization
Virtual Security Appliances
Leveraging Hardware Assists for Virtualization
Assuring Integrity of the TCB
Trusted Hardware and Supply Chain
Static versus Dynamic Root of Trust
Memory Protection (MPU)
Data Protection Protocols for Embedded Systems
Choosing the Network Layer for Security
Ethernet Security Protocols
IPsec versus SSL
Embedded VPN Clients
Custom Network Security Protocols
Secure Multimedia Protocols
Choosing the Storage Layer for Security
Symmetric Encryption Algorithm Selection
Managing the Storage Encryption Key
Testing for Security
Basic Testing Methods
2060 € HT
Next Scheduled Open Courses
From 15th to 16th of February 2024
Online EurAsia (9h-16h CET)
This course can be provided either remotely, in our Paris training center or, worldwide, on your premises.
Scheduled classes are confirmed as soon as there is two confirmed bookings. Bookings are accepted until 2 working days before the course start (1 week for face-to-face courses).