Course Description
Product security goes beyond the traditional information security CIA triad of confidentiality, integrity, and availability, and includes the expectation that products are secure. In this class cybersecurity is applied to hardware and software across the board with a focus on embedded systems and preventing malicious access and use. Over the last few years there has been an increase of concern regarding cybersecurity, systems, and software, especially with the Internet of Things expansion of massive interconnectivity.
Part of These Certificates
Introduction to Embedded Systems
Embedded System Vulnerability Analysis
Exploiting Real Time Operating Systems (RTOS)
Securing Embedded Systems Interfaces and Protocols
Securing Communications Protocols and Interfaces
Cybersecurity Attacks and Best Mitigation Practices for Embedded Systems
Upon completion of this course, participants will learn about:
Fundamentals of cybersecurity
Cybersecurity applied to product analysis, design, engineering and development
Fundamentals of embedded systems
Fundamentals of hardware/firmware/RTOS analysis and design
Embedded hardware, firmware and software analysis to detect vulnerabilities
Foundation knowledge of embedded systems cybersecurity threats, risks, mitigation strategies
Fundamentals of communication protocols, wired and wireless networks, information and network attacks used in embedded systems (WiFi, Bluetooth/BLE, ZigBee, 3G/4G/5G/5G Advanced/6G cellular, SATCOM and tactical HF/VHF/UHF/SHF including mmWave and Sub-THZ in 6G)
Risk assessment techniques and methodologies using defensive tools for mitigating risk and vulnerabilities
Related Courses
Earning a SLU certificate allows you to enhance your career options by networking with peers and establishing valuable industry contacts.
No related courses found.