Embedded systems offer many opportunities to economically and effectively control large infrastructure systems, small single purpose devices and many products in between. But their use can also introduce vulnerabilities easily exploited to gain access to valuable data, alter device functionality or impose other risks. Understand those unique vulnerabilities in embedded systems that are commonly exploited. Discover techniques and strategies for designing cybersecurity measures into products from the start. Through hands-on labs, examine emerging threats and learn to think like a hacker to gain the skills necessary to create more secure products. Focus on methodologies for assessing risk, integrating defensive tools for mitigating risk and addressing future vulnerabilities throughout the product life cycle. Discover best practices to integrate into your design processes to raise your level of product security.
- Develop foundational knowledge of cyber security threats and strategies for mitigating risk.
- View your products from the perspective of the hacker identifying exploitations and exploring how tools are used to gain entry into seemingly secure environments.
- Examine wired and wireless networks, network attacks and their impact on devices.
- Develop skills for analyzing and addressing vulnerabilities in products with embedded systems.
- Analyze embedded hardware and firmware to detect vulnerabilities and opportunities for improving security.
- Identify and apply best practices, skills and techniques for integrating security into the design process from the start.
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.