[SECU-IOT] : Embedded systems security

Duration and location

3 days

If inter : Hôtel Oceania Rennes – Saint-Grégoire, Bd Robert Schuman

35760 Saint-Grégoire, FRANCE

Rates

  • Inter : 2100€ per person
  • Intra : 12600€ (12 participants maximum)
  • On-demand : Contact us

Registration and information

Registration at least 5 business days before the beginning of the training

Training referent : Mr Julien MOINARD
Disability referent : Mr Adrien SCHMOUKER

Email : academy@lootus.net

Tél : +33(0)2 30 96 02 83

For any question including access conditions for the disabled public

Privacy

Our privacy policy is available here

GDPR Notice : Professional training

This training was last updated on February 16th, 2023

Registration to [SECU-IOT] inquiry

Q

Objectives

  • Understand the security weaknesses of embedded systems

  • Become aware of the attack techniques used by hackers to know how to limit the impacts

  • Apply some of these attack techniques

  • Know the notions of cryptography

  • Learn how to secure embedded systems from the design phase

  • Understand the vulnerabilities to be able to limit the risks

  • Discover notions of governance and risk assessment

Target audience

Developer, architect, integrator, hardware and embedded software designer.

Prerequisites

Experience in embedded software development is highly recommended.

Evaluation methods

  • MCQs at the beginning and end of the training
  • Training certificate in accordance with article L.6353-1 of the French Labour Code.

Methods used

  • PowerPoint course material (in French)
  • Teaching methods used: lecture, demonstration, experimentation
  • Practical work with the I²Cx Cyber Range training platform
  • If training in inter, a computer will be provided to each participant
  • If training in intra, the participants must already have a computer at their disposal, with the virtualization tool pre-installed (a download link is provided beforehand), and the following specifications:
      • Have already installed a virtulization too such as Vmware Player, Vmware Workstation or Vmware Fusion (or Virtualbox if applicable);
      • At least 15GB of available disk space (to deploy the virtual machine;
      • At least 6GB of RAM;
      • At least 2 CPU cores (Inte, i3, i5, i7 or AMD equivalent);
      • 2 free USB ports (USB2);
      • 64 bits OS with administrator privileges (Windows, Linux or Mac OS);
      • An OVA file to easily deploy the virtual machine will be provided.

Program

1. INTRODUCTION TO CYBERSECURITY

2. IOT CYBERSECURITY: TOOLS AND METHODS

3. PRACTICAL WORK

4. CRYPTOGRAPHY

    5. RADIO LINK ATTACK

    6. COVERT CHANNEL ATTACKS

    7. SECURITY PRINCIPLES

    8. GOVERNANCE AND RISK ASSESSMENT