Course Description
Product security goes beyond the traditional information security CIA triad of confidentiality, integrity, and availability, and includes the expectation that products are secure. In this class cybersecurity is applied to hardware and software across the board with a focus on embedded systems and preventing malicious access and use. Over the last few years there has been an increase of concern regarding cybersecurity, systems, and software, especially with the Internet of Things expansion of massive interconnectivity.
Product Cybersecurity 101 Dec 2025Product Cybersecurity 101
Introduction to Embedded Systems
Embedded System Vulnerability Analysis
Exploiting Real Time Operating Systems (RTOS)
Securing Embedded Systems Interfaces and Protocols
Securing Communications Protocols and Interfaces
Cybersecurity Attacks and Best Mitigation Practices for Embedded Systems
Upon completion of this course, participants will learn about:
Fundamentals of cybersecurity
Cybersecurity applied to product analysis, design, engineering and development
Fundamentals of embedded systems
Fundamentals of hardware/firmware/RTOS analysis and design
Embedded hardware, firmware and software analysis to detect vulnerabilities
Foundation knowledge of embedded systems cybersecurity threats, risks, mitigation strategies
Fundamentals of communication protocols, wired and wireless networks, information and network attacks used in embedded systems (WiFi, Bluetooth/BLE, ZigBee, 3G/4G/5G/5G Advanced/6G cellular, SATCOM and tactical HF/VHF/UHF/SHF including mmWave and Sub-THZ in 6G)
Risk assessment techniques and methodologies using defensive tools for mitigating risk and vulnerabilities
Related Certificates
Earning a Saint Louis University Workforce Center certificate allows you to enhance your career options by networking with peers and establishing valuable industry contacts.
ISACA Professional Certificate
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud.
See Details
Artificial Intelligence and Large Language Models Foundations
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud.
See Details
Artificial Intelligence and Machine Learning for Cybersecurity Operations
Artificial intelligence (AI) and machine learning (ML) are revolutionizing the cybersecurity industry. The emergence of ML as a tool for...
See Details