oSEC2Advanced Embedded Systems Security
Create secure connected embedded systems
|
Objectives
|
- Some programming concepts are desirable (whatever language)
- Some cryptography and Linux basics
- Theoretical course
- PDF course material (in English)
- Course dispensed using the Teams video-conferencing system
- The trainer to answer trainees’ questions during the training and provide technical and pedagogical assistance through the Teams video-conferencing system
- Practical activities
- Practical activities represent from 40% to 50% of course duration
- One Online Linux PC per trainee for the practical activities
- The trainer has access to trainees’ Online PCs for technical and pedagogical assistance
- Downloadable preconfigured virtual machine for post-course practical activities
- Total: 12 hours
- 2 sessions, 6 hours each
- Any embedded systems engineer or technician with the above prerequisites.
- The prerequisites indicated above are assessed before the training by the technical supervision of the traineein his company, or by the trainee himself in the exceptional case of an individual trainee.
- Trainee progress is assessed in two different ways, depending on the course:
- For courses lending themselves to practical exercises, the results of the exercises are checked by the trainer while, if necessary, helping trainees to carry them out by providing additional details.
- Quizzes are offered at the end of sections that do not include practical exercises to verifythat the trainees have assimilated the points presented
- At the end of the training, each trainee receives a certificate attesting that they have successfully completed the course.
- In the event of a problem, discovered during the course, due to a lack of prerequisites by the trainee a different or additional training is offered to them, generally to reinforce their prerequisites,in agreement with their company manager if applicable.
Course Outline
- The Operating System
- Multiple Independent Levels of Security
- Information Flow
- Data Isolation
- Damage Limitation
- Periods Processing
- Tamper Proof
- Evaluable
- Core embedded Operating system Security Requirements
- Memory Protection
- Virtual Memory
- Guard Pages
- Location obfuscation
- Fault Recovery
- Impact of Determinism
- Secure Scheduling
- Hypervisors and System Virtualization
- Introduction to System Virtualization
- Applications of System Virtualization
- Environment Sandboxing
- Virtual Security Appliances
- Hypervisor Architectures
- Paravirtualization
- Leveraging Hardware Assists for Virtualization
- ARM TrustZone
- Hypervisor Security
- I/O Virtualization
- Remote Management
- Assuring Integrity of the TCB
- Trusted Hardware and Supply Chain
- Secure Boot
- Static versus Dynamic Root of Trust
- Remote Attestation
| Exercise: | Memory Protection (MPU) | |
| Exercise: | ARM TrustZone | |
| Exercise: | Secure Boot | |
- Data-in-Motion Protocols
- Generalized Model
- Choosing the Network Layer for Security
- Ethernet Security Protocols
- IPsec versus SSL
- IPsec
- SSL/TLS
- Embedded VPN Clients
- DTLS
- SSH
- Custom Network Security Protocols
- Secure Multimedia Protocols
- Broadcast Security
- Data-at-Rest Protocols
- Choosing the Storage Layer for Security
- Symmetric Encryption Algorithm Selection
- Managing the Storage Encryption Key
- Basic Testing Methods
- White-Box Testing
- Black-Box Testing
- Grey-Box Testing
- Fuzz-Testing
More
To book a training session or for more information, please contact us on info@ac6-training.com.
Registrations are accepted till one week before the start date for scheduled classes. For late registrations, please consult us.
You can also fill and send us the registration form
This course can be provided either remotely, in our Paris training center or worldwide on your premises.
Scheduled classes are confirmed as soon as there is two confirmed bookings. Bookings are accepted until 1 week before the course start.
Last update of course schedule: 23 February 2026
Booking one of our trainings is subject to our General Terms of Sales
Related Courses
oC1
Effective MISRA C
oC2
MISRA Compliance for Project Managers
oSEC1
Secure C/C++ Development for Embedded Systems
oSEC10
Cyber Resilience Act (CRA) Compliance for Embedded Systems
oSEC12
Comprehensive Secure Systems Programming
oSEC5
Embedded Security for STM32-based devices
oSEC6
Embedded Security for NXP i.MX-based processors
oSEC7
ARM TrustZone for Cortex-M based devices
oSEC8
Secured Embedded Linux Platform Build
oSEC9
Advanced Embedded Linux Security