+ +
- -
eLearning et Cours en ligne
 
Calendrier  Détails
Systèmes d'Exploitation
Calendrier  Détails
Programmation
Calendrier  Détails
Processors
 
Calendrier  Détails
Communications
 
 
 
Calendrier  Détails
+ +
> >
- -

 
ac6 >> ac6-training >> eLearning et Cours en ligne >> Embedded security >> Advanced Embedded Systems Security Télécharger le catalogue Télécharger la page Ecrivez nous Version imprimable

oSEC2 Advanced Embedded Systems Security

This is a Live Online Training

formateur
Objectives
  • How to manipulate files and directories in a secure manner
  • Discover how to protect your programs from malicious user input
  • Secure System Software Consideration
  • Embedded system hardware features for security
  • Secure Software Development methodology and framework
  • Apprehend the context and the use of Hypervisors and System Virtualization
  • Discover Security checks and Tools
Prerequisites
  • Some programming concepts are desirable (whatever language)

First Session
System Software Consideration
  • The Operating System
  • Multiple Independent Levels of Security
    • Information Flow
    • Data Isolation
    • Damage Limitation
    • Periods Processing
    • Tamper Proof
    • Evaluable
  • Core embedded Operating system Security Requirements
    • Memory Protection
    • Virtual Memory
  • Guard Pages
  • Location obfuscation
    • Fault Recovery
    • Impact of Determinism
    • Secure Scheduling
  • Hypervisors and System Virtualization
    • Introduction to System Virtualization
    • Applications of System Virtualization
    • Environment Sandboxing
    • Virtual Security Appliances
  • Hypervisor Architectures
  • Paravirtualization
  • Leveraging Hardware Assists for Virtualization
    • ARM TrustZone
  • Hypervisor Security
  • I/O Virtualization
  • Remote Management
  • Assuring Integrity of the TCB
    • Trusted Hardware and Supply Chain
    • Secure Boot
    • Static versus Dynamic Root of Trust
    • Remote Attestation
Exercise :  Memory Protection (MPU)
Exercise :  ARM TrustZone
Exercise :  Secure Boot
Exercise :  Remote Attestation
Second Session
Data Protection Protocols for Embedded Systems
  • Data-in-Motion Protocols
    • Generalized Model
    • Choosing the Network Layer for Security
    • Ethernet Security Protocols
    • IPsec versus SSL
    • IPsec
    • SSL/TLS
    • Embedded VPN Clients
    • DTLS
    • SSH
    • Custom Network Security Protocols
    • Secure Multimedia Protocols
    • Broadcast Security
  • Data-at-Rest Protocols
    • Choosing the Storage Layer for Security
    • Symmetric Encryption Algorithm Selection
    • Managing the Storage Encryption Key
Exercise :  WolfSSL TLS integration
Exercise :  Managing the Storage Encryption Key
Testing for Security
  • Tools
  • Penetration Testing
  • Protocol Fuzzing
  • SPA
  • DPA