[SECU-IOT] : Embedded systems security
Duration and location
3 days
If inter : Hôtel Oceania Rennes – Saint-Grégoire, Bd Robert Schuman
35760 Saint-Grégoire, FRANCE
Rates
- Inter : 2100€ per person
- Intra : 12600€ (12 participants maximum)
- On-demand : Contact us
Registration and information
Registration at least 5 business days before the beginning of the training
Training referent : Mr Julien MOINARD
Disability referent : Mr Adrien SCHMOUKER
Email : academy@lootus.net
Tél : +33(0)2 30 96 02 83
For any question including access conditions for the disabled public
Privacy
Our privacy policy is available here
GDPR Notice : Professional training
This training was last updated on February 16th, 2023
Registration to [SECU-IOT] inquiry
Objectives
-
Understand the security weaknesses of embedded systems
-
Become aware of the attack techniques used by hackers to know how to limit the impacts
-
Apply some of these attack techniques
-
Know the notions of cryptography
-
Learn how to secure embedded systems from the design phase
-
Understand the vulnerabilities to be able to limit the risks
-
Discover notions of governance and risk assessment
Target audience
Developer, architect, integrator, hardware and embedded software designer.
Prerequisites
Experience in embedded software development is highly recommended.
Evaluation methods
- MCQs at the beginning and end of the training
- Training certificate in accordance with article L.6353-1 of the French Labour Code.
Methods used
- PowerPoint course material (in French)
- Teaching methods used: lecture, demonstration, experimentation
- Practical work with the I²Cx Cyber Range training platform
- If training in inter, a computer will be provided to each participant
- If training in intra, the participants must already have a computer at their disposal, with the virtualization tool pre-installed (a download link is provided beforehand), and the following specifications:
-
- Have already installed a virtulization too such as Vmware Player, Vmware Workstation or Vmware Fusion (or Virtualbox if applicable);
- At least 15GB of available disk space (to deploy the virtual machine;
- At least 6GB of RAM;
- At least 2 CPU cores (Inte, i3, i5, i7 or AMD equivalent);
- 2 free USB ports (USB2);
- 64 bits OS with administrator privileges (Windows, Linux or Mac OS);
- An OVA file to easily deploy the virtual machine will be provided.
-
Program
1. INTRODUCTION TO CYBERSECURITY
2. IOT CYBERSECURITY: TOOLS AND METHODS
3. PRACTICAL WORK
4. CRYPTOGRAPHY
5. RADIO LINK ATTACK
6. COVERT CHANNEL ATTACKS
7. SECURITY PRINCIPLES
8. GOVERNANCE AND RISK ASSESSMENT