Course Outline
Introduction
- Automotive functionality, user experience and safety
Overview of Automotive Cybersecurity
- System level, process level, after-sales
An Automobile's Most Hackable Surfaces
Inspecting the Architecture
- Identifying vulnerabilities in OEM and Tier supplier platform
Software Loading
- Validating with Secure Boot
Hardware Security
- Checking digital signatures and product keys
Network Security
- Authenticating Communications
Cloud Security
- Remote monitoring, software updates, OTA, etc.
Hardening the Architecture
Penetration Testing
- Using automated tools
Reverse Engineering
- Vehicle communication systems
Cryptography
- OBD cryptography
- Blockchain
Secure Code Development
- Shortcomings of secure coding guidelines
Device Testing
- Interoperability, connectivity and security
Best Practices
- Cybersecurity management, lifecycle, risk management, etc.
Summary and Next Steps
Requirements
- An understanding of general security concepts
- Experience with automotive design
- An understanding of embedded systems
Audience
- Engineers
- Architects
- Engineering managers
Testimonials (8)
A real presentation of knowledge representing methods used by real AUTOSAR specialists in the automotive industry.
Bartlomiej - BorgWarner Poland Sp. z o.o.
Course - Autosar Introduction – Technology Overview
Machine Translated
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
Lap Qradar
Sutthikan Noisombat - NTT
Course - IBM Qradar SIEM: Beginner to Advanced
Accessing tools and being able to ask questions to someone friendly who I felt wouldn't judge me
Kiara
Course - Open Source Cyber Intelligence - Introduction
The simple explanation of the trainer
Mohammed salem - Palestinian Police
Course - Open Source Intelligence (OSINT) Advanced
the balance between lectures and practice, the rhythm, the trainer knowledge and pedagogic skill
Armando Pinto - EID
Course - C/C++ Secure Coding
Very good knowledge and character.
Constantinos Michael
Course - Java and Web Application Security
Pushing changes on an ongoing basis, when on the 3rd day I started to get more lost than before and it was harder to spot the error quickly, I was quickly able to check out the latest changes and stay up to date with the material
Paulina
Course - Advanced Java Security
Machine Translated