Cybersecurity for Developers: Secure Coding for Embedded Systems

Defend your embedded code against threats

Learn the security mindset, how to prevent threats, and how to find them.

Why Attend

This learning program is for any software developer, software tester, or software architect who wants to prevent threats and find vulnerabilities in software applications. Learn:

  • Learn the mindset of security for embedded systems
  • Practice exploiting vulnerabilities in embedded systems
  • Understand threats and vulnerabilities
  • Manage security risks with Threat Modeling
  • Apply modern design and architecture practices like Defense in Depth, Zero Trust Security, and the STRIDE model
  • Identify assets and use data flow diagrams to pinpoint potential vulnerabilities
  • Practice pen testing to step into the mindset of an attacker

Who Should Attend

All team members who want to learn how to prevent and find security issues in their products.

Practical Details

  • Language: English
  • Experiential, hands-on, interactive online learning with practical examples
  • Participants will be awarded a Mozaic Works certificate of completion
Quantity:
- +

Price
Original price was: €1,081.00.Current price is: €781.00.

Agenda

Fundamentals of Embedded Software Security

  • The Need for Application Security
  • Understanding Attackers
  • Cyberattacks
  • Security is a Continuous Activity
  • Security Considerations for Embedded Systems

Attacking an Embedded System

  • Obtain Firmware
  • Extract File System
  • Find hardcoded and insecure secrets
  • Exploit Insecure Boot
  • Insecure Network Exploits

Vulnerabilities of Embedded Systems and How To Find Them

  • Security Mindset for Embedded Developers
  • Unsafe Memory Operations
  • Injection Vulnerabilities
  • Cryptography Vulnerabilities
  • Insecure Firmware Updates
  • Weak Identity Management
  • Insecure Communication
  • Debug Code and Interfaces
  • Misconfigured Security Settings

Threat Modeling

  • How to Build a Threat Model
  • Data Flow Diagram
  • Brainstorming Threats
  • The STRIDE Classification of Threats
  • Threat Mitigation

Cyber Defense Principles and Practices

  • Defense In Depth Principle
  • Reduce the Attack Surface
  • Principle of Least Privilege
  • Zero Trust Security Model
  • Principle of Least Visibility

Implementation Practices for Security of Embedded Systems

  • Avoid and Detect Memory Corruption
  • Prevent Injection
  • Safe Firmware Updates
  • Secure Sensitive Information
  • Harden Identity Management
  • Remove Unused and Unsafe Libraries
  • Remove Debugging Code and Interfaces
  • Use Safe Communication

What’s Next

More details and full agenda here

Meet Your Trainers

Alex Bolboaca

CTO, Senior Trainer at Mozaic Works

With over 25 years of international experience in the world of software and technology, Alexandru shares about himself: Being deeply passionate about technology creation I am a continuous learner in the field. Between reading, trying out technologies and multiple programming languages, presenting and participating to developer communities and conferences, I have learned enough to write two books and teach hundreds of developers and architects. I love working with smart people who want to get better at what they do, whether it’s team work, communication, management or technical skills. I offer you my passion, my experience and my capacity to adapt to your needs. About Alex

More about Alex Bolboaca >
0
    0
    Your Cart
    Your cart is empty
      Apply Coupon
      Scroll to Top