Print Friendly, PDF & Email

Embedded systems run most of the machines and devices that we use every day. This includes cars, microwave ovens, washing machines, coffee machines, digital cameras and mobile phones.

Machines and devices of embedded systems are architected around microcontrollers or larger microprocessors with external memory (peripherals for the most complex ones), and sometimes FPGAs (field programmable gate arrays), when high-performance, determinism, and nanosecond real time are required.

All of these systems have one very important element in common – they’re programmable. This presents the second common element they all share – vulnerability of being reprogrammed with malware.

Because of growing cybersecurity risks, designers and developers of today are now focusing on creating embedded systems around processors that provide a secure boot capability that is able to validate the integrity of the software, or firmware it is running, on a systematic basis.

This is important because embedded systems are the driving force for technological development in many domains such as automotive, healthcare and industrial control in the emerging post-PC era.

As more and more computational and networked devices are integrated into all aspects of our lives, security becomes critical for the dependability of all smart or intelligent systems built upon these embedded systems.

It’s generally agreed that full-scale embedded security requires solutions that are:

  • Hardware and software-based.
  • CPU- and OS-independent.
  • Protecting firmware, particularly during over-the-air updates.
  • Inexpensive, simple and power-efficient and working with a minimum latency.

External secure elements providing state-of-the-art anti-tamper and cryptography mechanisms are often very useful companion chips to these secure processors.

Cybersecurity Applied To Embedded Systems Training

Tonex offers a 2-day Cybersecurity Applied To Embedded Systems Training course that covers these topics:

–Cybersecurity 101

–Introduction to embedded systems

–Embedded systems vulnerability analysis

–Exploiting real time operating systems

–Securing embedded systems interfaces and protocols

Participants can expect to learn:

  • Application code and surveillance data
  • Cyber risks applied to embedded systems
  • Hacking tools and entry points
  • Embedded system security threats
  • Encryption and authorization
  • Principles and practices designed to safeguard your embedded system
  • Embedded hardware and firmware analysis and reverse engineering

Who Should Attend

This course is designed for a wide range of professionals including application managers, information security personnel, developers working with embedded systems and product/process designers and engineers.

The Tonex Way

–Reasonably priced classes taught by the best trainers is the reason all kinds of organizations from Fortune 500 companies to government’s most important agencies return for updates in courses and hands-on workshops.

— Tonex has been presenting technology and management training courses and seminars for individuals and organizations since 1993.

–Ratings tabulated from student feedback post-course evaluations show an amazing 98 percent satisfaction score.

For more information, questions, comments, Contact us.

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.