21 hours (usually 3 days including breaks)
This instructor-led, live training introduces the system architectures, operating systems, networking, storage, and cryptographic issues that should be considered when designing secure embedded systems.
By the end of this course, participants will have a solid understanding of security principles, concerns, and technologies. More importantly, participants will be equipped with the techniques needed for developing safe and secure embedded software.
Format of the course
Course Customization Options
Characteristics of Embedded Application Security
Critical Aspects of an Embedded System
Performing Threat Modeling and Assessment
Developing Secure Embedded Software
Understanding and Implementing Cryptography
Retrofitting Security in Existing Projects
Summary and Conclusion
Also provided a lot of curiously related interesting in some way with the subject
EduBroker Sp. z o.o.
Security models, discussion of good programming practices, various types of attacks.
Piotr Piątek - EduBroker Sp. z o.o.
We are looking to expand our presence in Turkey!
If you are interested in running a high-tech, high-quality training and consulting business.Apply now!