SlideShare a Scribd company logo
Cyber Security
Applied To
Embedded
Systems
Call Us Today: +1-972-665-9786
https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/
TAKE THIS COURSE
Since 1993, Tonex has specialized in providing industry-leading training, courses, seminars,
workshops, and consulting services. Fortune 500 companies certified.
Since 1993, Tonex has specialized in providing industry-leading training,
courses, seminars, workshops, and consulting services.
Why Tonex ?
--Presenting highly customized learning solutions is what we do. For over 30
years TONEX has worked with organizations in improving their
understanding and capabilities in topics often with new development,
design, optimization, regulations and compliances that, frankly, can be
difficult to comprehend.
--Ratings tabulated from student feedback post-course evaluations show an
amazing 98 percent satisfaction score.
--Reasonably priced classes taught by the best trainers is the reason all kinds
of organizations from Fortune 500 companies to government’s most
important agencies return for updates in courses and hands-on workshops
TAKE THIS COURSE
Audience:
2-day course designed for :
“Product/process designers and
engineers Developers working
with embedded systems
Information security professionals
Application developers”
Price: $1,999.00 Length: 2 Days
Cyber Security Applied to Embedded Systems
https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/
Cyber Security Applied to Embedded Systems
Training is a 2-day training talks about basics of
embedded systems and uses of Cyber Security to
show exceptional vulnerabilities that are usually
misused. find out about strategies and methods
considering cyber security measures in the whole
framework life cycle and obtaining. Secure
Embedded Systems incorporate numerous
methodology, strategies and procedures to
flawlessly coordinate cyber security inside
embedded framework programming.
Added security segments to embedded systems
can block a framework's usefulness and effect the
continuous execution of the mission basic
systems. Framework architects, engineers and
examiners require an all around characterized
approach for all the while outlining embedded
usefulness and cyber security.
TAKE THIS COURSECyber Security Applied to Embedded Systems
https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/
TAKE THIS COURSECyber Security Applied to Embedded Systems
https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/
This course will likewise train understudies how to examine, turn around, investigate, and abuse
embedded RTOS firmware. Hands-on involvement with an assortment of true gadgets, RTOS's,
and designs furnish understudies with the down to earth information and aptitudes important to
be capable in RTOS defenselessness examination and misuse. We will examine chance evaluation
philosophies, disappointment examination and utilizing protective tools to moderate cyber
hazard and vulnerabilities.
To guarantee effective mission control framework execution, embedded systems, for example,
weapon systems, rockets, shrewd weapons, Network Enabled Weapons (NEW), UAVs,
correspondences systems, mechanical control systems, medicinal gadgets, apply autonomy,
brilliant matrix, SCADA, Intelligent Electronic Devices (IED), PLCs, and autonomous autos must be
anchored to play out their planned capacities, forestall cybeattacks, and work with no cyberattack
affect.
Cyber Security Applied to Embedded Systems acquaints cybersecurity ideas applied with
embedded systems, firmware, equipment and embedded programming. This course is intended
for anybody keen on cybersecurity, investigation, abusing, and fixing vulnerabilities with true
embedded systems.
TAKE THIS COURSECyber Security Applied to Embedded Systems
https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/
TAKE THIS COURSECyber Security Applied to Embedded Systems
https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/
Takeaways from this course include:
• Examining how to cybersecurity fit in the embedded systems
• Fundamentals of Cybersecurity
• Fundamentals of Embedded Systems
• Fundamentals of embedded system product design cycle, project management, design
for production, V&V and O&M
• Embedded Systems Security Requirements
• Fundamentals of hardware and firmware analysis and design in embedded design
• Vulnerabilities in embedded systems
• Embedded hardware and firmware analysis to detect vulnerabilities
• Foundation knowledge of cyber security threats, risks, mitigation strategies applied to
embedded systems
• Exploitable vulnerabilities in embedded systems and techniques and strategies for
systems engineering embedded systems
• Communication protocols, wired and wireless networks, information and network attacks
and their impact on embedded devices
• Risk assessment techniques and methodologies and using defensive tools for mitigating
risk and vulnerabilities
TAKE THIS COURSECyber Security Applied to Embedded Systems
https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/
TAKE THIS COURSECyber Security Applied to Embedded Systems
https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/
Course Topics:
• Cybersecurity 101
• Introduction to Embedded Systems
• Embedded System Vulnerability Analysis
• Exploiting Real Time Operating Systems
• Securing Embedded Systems Interfaces and Protocols
• Cybersecurity Attacks and Best Mitigation Practices for Embedded Systems
• Case Study and Workshop
TAKE THIS COURSECyber Security Applied to Embedded Systems
https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/
TAKE THIS COURSECyber Security Applied to Embedded Systems
https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/
Cybersecurity 101
• What is Cybersecurity?
• Basic principles of CIA
• Confidentiality
• Embedded system’s critical information
• Application code and surveillance data
• Unauthorized entities and Integrity
• Availability and mission objectives
• Cyber Risks applied to Embedded Systems
• Principles and practices designed to safeguard your embedded system
• Hacking tools and entry points
• Encryption and authentication, Data Integrity
• Vulnerability analysis 101 and Mitigation 101
• Networking and network attacks
• Role of wireless networks in the embedded systems
• Embedded hardware and firmware analysis and reverse engineering
• Embedded system security Threats
• Intrusion and Virus, Worm, Trojan Horse (Malware)
• Spyware , DoS and Secure software fundamentals
TAKE THIS COURSECyber Security Applied to Embedded Systems
https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/
Introduction to Embedded Systems
• Embedded Systems 101
• Hardware Architecture
• Software Development
• Microprocessor Primer
• Basic architecture
• Programmer’s view
• Embedded Operating Systems
• Case Study: Embedded mmWave Radar System
• Embedded Systems Engineering
TAKE THIS COURSECyber Security Applied to Embedded Systems
https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/
Embedded System Vulnerability Analysis
• Networking and network attacks
• Wireless networks and embedded systems
• Embedded hardware and firmware analysis
• Exploiting Embedded Devices
• The stages of router exploitation
• Initial Reconnaissance and Exploitation
• Firmware Unpacking and Modification
• Detecting, Extracting and Analysis
• Cross Compiling
• Modification and Creation of new firmware
• Persistent Dynamic Backdoor
• Firmware analysis and extraction
• Finding and exploiting logic flaws
• Firmware emulation and debugging
• Finding and exploiting real-world overflows
• Foundations of cyber security and emerging threats
• Hacking/exploitation techniques, tools and entry points
• Defensive technologies: Encryption and authentication
TAKE THIS COURSECyber Security Applied to Embedded Systems
https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/
TAKE THIS COURSECyber Security Applied to Embedded Systems
https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/
Exploiting Real Time Operating Systems
• Basic introduction to the concept of Real Time Operating Systems
• Overview of MIPS architecture and design
• Firmware analysis of our first target device
• Debugging our first target device
• Augmenting IDA’s auto analysis
• Searching for backdoors
• How not to crash your target
• Hardware & firmware analysis
• Identifying functions without a symbol table
• Low-hanging crypto
• Breaking custom crypto
• Practical exploitation of crypto bugs
• More firmware analysis
• Augmenting IDA’s auto analysis
• Chip backdoors and Hidden manufacturer menus
• Hardware Hacking, Basic electronics and circuit analysis
• Analog/digital communications
• Common inter-component protocols
TAKE THIS COURSECyber Security Applied to Embedded Systems
https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/
Securing Embedded Systems Interfaces and Protocols
• Embedded Systems Communication Protocols
• Universal Asynchronous Receiver/Transmitter (UART)
• Serial Peripheral Interface (SPI)
• Joint Test Action Group (JTAG)
• Inter-integrated Circuit (I2C)
• I2C bus, CAN bus and FireWire bus
• USB and Parallel protocols
• PCI bus and ARM bus
• Wireless protocols
• IrDA
• Bluetooth and Bluetooth LE (BLE)
• IEEE 802.11
• NFC and RFID
• 802.15.4
• 6LowPAN and Thread
• Zigbee
• Z-Wave
TAKE THIS COURSECyber Security Applied to Embedded Systems
https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/
TAKE THIS COURSECyber Security Applied to Embedded Systems
https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/
Cybersecurity Attacks and Best Mitigation Practices for Embedded Systems
• Non-Invasive Hardware Reverse Engineering
• Component identification
• Tracking PCB traces
• Re-producing schematic and block diagrams
• Bus Sniffing
• Interface Analysis
• Communications protocols sniffing
• Decoding and deciphering captured bits
• Critical data identification and detection
• Component removal and replacement
• Dealing with surface mount components
• Electronics and circuit analysis
• Understanding your tools and their effects on the circuit
• Understanding the circuit and its effect on your tools
• Security Measures
TAKE THIS COURSECyber Security Applied to Embedded Systems
https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/
Case Study and Workshop
• Cybersecurity Analysis of Embedded Systems used in unmanned aircraft system (UAS)
• Design Process
• Embedded system CONOPS
• Mission objectives
• CONOPS
• Test and evaluation
• Functional requirements
• Threat analysis and System design
• Security requirements
• Performance evaluation
• Security evaluation
• System Implementation Security
• Attack surface, Boot process, system data, and software
• Physical attack surface and Root of trust establishment
• Trust hardware and software components , Trusted platform module (TPM)
• Operating system (OS) and Mission-specific application code (Apps)
• Field-programmable gate array (FPGA)
• BIOS, Boot process, Startup and Trusted computing base (TCB)
TAKE THIS COURSECyber Security Applied to Embedded Systems
https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/
TAKE THIS COURSE
Price: $1999.00 Length: 2 Days
https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/
Cyber Security Applied To
Embedded Systems
Contact Tonex Training Expert
Dallas, TX:
1400 Preston Rd., Suite 400
Plano, Texas 75093
Tel: +1-972-665-9786
Washington, DC:
1025 Connecticut Ave, NW Suite 1000
Washington, DC 20036
Tel: +1-202-327-5404
International: +1-214-762-6673
Fax: +1-972-692-7492
Visit Tonex website
https://www.tonex.com/
Cyber security applied to embedded systems

More Related Content

PPTX
Software Security Training
PDF
1 info sec+risk-mgmt
PPT
2008: Web Application Security Tutorial
PPTX
Cyber Security Certificate Training
PPTX
Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...
PPTX
Advanced Persistent Threats (APTs) - Information Security Management
PPT
Software security engineering
PDF
McAffee_Security and System Integrity in Embedded Devices
Software Security Training
1 info sec+risk-mgmt
2008: Web Application Security Tutorial
Cyber Security Certificate Training
Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...
Advanced Persistent Threats (APTs) - Information Security Management
Software security engineering
McAffee_Security and System Integrity in Embedded Devices

What's hot (19)

PPTX
Practical Application of Physical Security Criteria
PPTX
Owasp Proactive Controls for Web developer
PDF
Embedded Systems Security: Building a More Secure Device
PDF
Comp tia security sy0 601 domain 3 implementation
PPTX
List of cybersecurity training courses by Tonex
PPTX
Cybersecurity Test and Evaluation (TE) Training : Tonex Training
PDF
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
PPTX
Cyber Defence Intelligence (CDI)
PDF
Offensive cyber security engineer updated
PPTX
Security Culture from Concept to Maintenance: Secure Software Development Lif...
PDF
CISSP introduction 2016 Udemy Course
PDF
Industrial Control System Security Taxonomic Framework with Application to a ...
PDF
TUD CS4105 | 2015 | Lecture 1
PPSX
7 Software Development Security
PPT
Software security engineering
PDF
Managing Next Generation Threats to Cyber Security
PDF
Building a Cyber Security Operations Center for SCADA/ICS Environments
PDF
Cyber Threats on the Industrial Environment
PPTX
How to Prepare for the CISSP Exam
Practical Application of Physical Security Criteria
Owasp Proactive Controls for Web developer
Embedded Systems Security: Building a More Secure Device
Comp tia security sy0 601 domain 3 implementation
List of cybersecurity training courses by Tonex
Cybersecurity Test and Evaluation (TE) Training : Tonex Training
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Cyber Defence Intelligence (CDI)
Offensive cyber security engineer updated
Security Culture from Concept to Maintenance: Secure Software Development Lif...
CISSP introduction 2016 Udemy Course
Industrial Control System Security Taxonomic Framework with Application to a ...
TUD CS4105 | 2015 | Lecture 1
7 Software Development Security
Software security engineering
Managing Next Generation Threats to Cyber Security
Building a Cyber Security Operations Center for SCADA/ICS Environments
Cyber Threats on the Industrial Environment
How to Prepare for the CISSP Exam
Ad

Similar to Cyber security applied to embedded systems (20)

PPTX
ICS (Industrial Control System) Cybersecurity Training
PPTX
Cyber Threat Simulation
PPTX
Software application security training course | Tonex Training
PPSX
TSS - App Penetration Testing Services
PPTX
Proactive Approach to OT incident response - HOUSECCON 2023
PPTX
Autonomous and Semi-Autonomous Cybersecurity Training
PPTX
Add-Structure-and-Credibility-to-Your-Security-Portfolio-with-CIS-Controls-v8...
PDF
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
PPTX
CPS, Cybersecurity Workshop, Cyber Physical Systems (CPS) Workshop
PPTX
How to Get Started with DevSecOps
PDF
Foxtrot Division Capabilities Collection
PPTX
MS. Cybersecurity Reference Architecture
PPTX
Threat modelling(system + enterprise)
PDF
Cyber war scenario what are the defenses
PPTX
CompTIA CySA+ domains and their Weightage.pptx
PDF
Careers in Cyber Security
PDF
S4x20 Forescout Presentation
PPTX
Managing security threats in today’s enterprise
PPTX
Fundamentals of threats and risk management course, cybersecurity
PPTX
How To Secure MIS
ICS (Industrial Control System) Cybersecurity Training
Cyber Threat Simulation
Software application security training course | Tonex Training
TSS - App Penetration Testing Services
Proactive Approach to OT incident response - HOUSECCON 2023
Autonomous and Semi-Autonomous Cybersecurity Training
Add-Structure-and-Credibility-to-Your-Security-Portfolio-with-CIS-Controls-v8...
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
CPS, Cybersecurity Workshop, Cyber Physical Systems (CPS) Workshop
How to Get Started with DevSecOps
Foxtrot Division Capabilities Collection
MS. Cybersecurity Reference Architecture
Threat modelling(system + enterprise)
Cyber war scenario what are the defenses
CompTIA CySA+ domains and their Weightage.pptx
Careers in Cyber Security
S4x20 Forescout Presentation
Managing security threats in today’s enterprise
Fundamentals of threats and risk management course, cybersecurity
How To Secure MIS
Ad

More from Tonex (20)

PPTX
5G AI & Digital Twins Training Course
PPTX
MBSE for Dod, Digital Engineering Training
PPTX
Engineering Project Management Training, Learn the PMI keys, Project manageme...
PPTX
Revenue Assurance (RA), Telecom RA Training Course
PPTX
5G Systems Engineering Training
PPTX
Root Cause Analysis Training
PPTX
Learning PFMEA, Process Failure Mode Effects Analysis, PFMEA Advantages, Tools
PPTX
Proposal Engineering Hands-On Workshop, Architecture, Construction and Engine...
PPTX
Cybersecurity Hands-On Training
PPTX
Bluetooth Low Energy BLE, Hands-On Training
PPTX
Learn how manufacturers use root cause analysis, rca training for manufacturers
PPTX
Spacecraft MBSE-SysML, Hands-On Training
PPTX
CBRS
PPTX
C Programming and Coding Standards, Learn C Programming
PPTX
Tonex "Software Engineering Training" Top 5 Courses For Cybersecurity Profess...
PPTX
Electronic Warfare Threat Modeling and Simulation Training
PPTX
Join Business Writing Skills Training and Write clear
PPTX
Conflict Management Training, Learn The Causes Of Conflict
PPTX
Big Data for Project and Program Managers
PPTX
DevSecOps Training Bootcamp - A Practical DevSecOps Course
5G AI & Digital Twins Training Course
MBSE for Dod, Digital Engineering Training
Engineering Project Management Training, Learn the PMI keys, Project manageme...
Revenue Assurance (RA), Telecom RA Training Course
5G Systems Engineering Training
Root Cause Analysis Training
Learning PFMEA, Process Failure Mode Effects Analysis, PFMEA Advantages, Tools
Proposal Engineering Hands-On Workshop, Architecture, Construction and Engine...
Cybersecurity Hands-On Training
Bluetooth Low Energy BLE, Hands-On Training
Learn how manufacturers use root cause analysis, rca training for manufacturers
Spacecraft MBSE-SysML, Hands-On Training
CBRS
C Programming and Coding Standards, Learn C Programming
Tonex "Software Engineering Training" Top 5 Courses For Cybersecurity Profess...
Electronic Warfare Threat Modeling and Simulation Training
Join Business Writing Skills Training and Write clear
Conflict Management Training, Learn The Causes Of Conflict
Big Data for Project and Program Managers
DevSecOps Training Bootcamp - A Practical DevSecOps Course

Recently uploaded (20)

PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PPTX
SAP Ariba Sourcing PPT for learning material
PDF
The Internet -By the Numbers, Sri Lanka Edition
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPTX
international classification of diseases ICD-10 review PPT.pptx
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PPTX
E -tech empowerment technologies PowerPoint
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PPTX
Introduction to Information and Communication Technology
PPTX
innovation process that make everything different.pptx
PDF
Introduction to the IoT system, how the IoT system works
PDF
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
introduction about ICD -10 & ICD-11 ppt.pptx
RPKI Status Update, presented by Makito Lay at IDNOG 10
SAP Ariba Sourcing PPT for learning material
The Internet -By the Numbers, Sri Lanka Edition
Job_Card_System_Styled_lorem_ipsum_.pptx
Paper PDF World Game (s) Great Redesign.pdf
international classification of diseases ICD-10 review PPT.pptx
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
Introuction about ICD -10 and ICD-11 PPT.pptx
Cloud-Scale Log Monitoring _ Datadog.pdf
E -tech empowerment technologies PowerPoint
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
Introduction to Information and Communication Technology
innovation process that make everything different.pptx
Introduction to the IoT system, how the IoT system works
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
Module 1 - Cyber Law and Ethics 101.pptx
Power Point - Lesson 3_2.pptx grad school presentation
The New Creative Director: How AI Tools for Social Media Content Creation Are...

Cyber security applied to embedded systems

  • 1. Cyber Security Applied To Embedded Systems Call Us Today: +1-972-665-9786 https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/ TAKE THIS COURSE Since 1993, Tonex has specialized in providing industry-leading training, courses, seminars, workshops, and consulting services. Fortune 500 companies certified.
  • 2. Since 1993, Tonex has specialized in providing industry-leading training, courses, seminars, workshops, and consulting services. Why Tonex ? --Presenting highly customized learning solutions is what we do. For over 30 years TONEX has worked with organizations in improving their understanding and capabilities in topics often with new development, design, optimization, regulations and compliances that, frankly, can be difficult to comprehend. --Ratings tabulated from student feedback post-course evaluations show an amazing 98 percent satisfaction score. --Reasonably priced classes taught by the best trainers is the reason all kinds of organizations from Fortune 500 companies to government’s most important agencies return for updates in courses and hands-on workshops
  • 3. TAKE THIS COURSE Audience: 2-day course designed for : “Product/process designers and engineers Developers working with embedded systems Information security professionals Application developers” Price: $1,999.00 Length: 2 Days Cyber Security Applied to Embedded Systems https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/
  • 4. Cyber Security Applied to Embedded Systems Training is a 2-day training talks about basics of embedded systems and uses of Cyber Security to show exceptional vulnerabilities that are usually misused. find out about strategies and methods considering cyber security measures in the whole framework life cycle and obtaining. Secure Embedded Systems incorporate numerous methodology, strategies and procedures to flawlessly coordinate cyber security inside embedded framework programming. Added security segments to embedded systems can block a framework's usefulness and effect the continuous execution of the mission basic systems. Framework architects, engineers and examiners require an all around characterized approach for all the while outlining embedded usefulness and cyber security. TAKE THIS COURSECyber Security Applied to Embedded Systems https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/
  • 5. TAKE THIS COURSECyber Security Applied to Embedded Systems https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/ This course will likewise train understudies how to examine, turn around, investigate, and abuse embedded RTOS firmware. Hands-on involvement with an assortment of true gadgets, RTOS's, and designs furnish understudies with the down to earth information and aptitudes important to be capable in RTOS defenselessness examination and misuse. We will examine chance evaluation philosophies, disappointment examination and utilizing protective tools to moderate cyber hazard and vulnerabilities. To guarantee effective mission control framework execution, embedded systems, for example, weapon systems, rockets, shrewd weapons, Network Enabled Weapons (NEW), UAVs, correspondences systems, mechanical control systems, medicinal gadgets, apply autonomy, brilliant matrix, SCADA, Intelligent Electronic Devices (IED), PLCs, and autonomous autos must be anchored to play out their planned capacities, forestall cybeattacks, and work with no cyberattack affect. Cyber Security Applied to Embedded Systems acquaints cybersecurity ideas applied with embedded systems, firmware, equipment and embedded programming. This course is intended for anybody keen on cybersecurity, investigation, abusing, and fixing vulnerabilities with true embedded systems.
  • 6. TAKE THIS COURSECyber Security Applied to Embedded Systems https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/
  • 7. TAKE THIS COURSECyber Security Applied to Embedded Systems https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/ Takeaways from this course include: • Examining how to cybersecurity fit in the embedded systems • Fundamentals of Cybersecurity • Fundamentals of Embedded Systems • Fundamentals of embedded system product design cycle, project management, design for production, V&V and O&M • Embedded Systems Security Requirements • Fundamentals of hardware and firmware analysis and design in embedded design • Vulnerabilities in embedded systems • Embedded hardware and firmware analysis to detect vulnerabilities • Foundation knowledge of cyber security threats, risks, mitigation strategies applied to embedded systems • Exploitable vulnerabilities in embedded systems and techniques and strategies for systems engineering embedded systems • Communication protocols, wired and wireless networks, information and network attacks and their impact on embedded devices • Risk assessment techniques and methodologies and using defensive tools for mitigating risk and vulnerabilities
  • 8. TAKE THIS COURSECyber Security Applied to Embedded Systems https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/
  • 9. TAKE THIS COURSECyber Security Applied to Embedded Systems https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/ Course Topics: • Cybersecurity 101 • Introduction to Embedded Systems • Embedded System Vulnerability Analysis • Exploiting Real Time Operating Systems • Securing Embedded Systems Interfaces and Protocols • Cybersecurity Attacks and Best Mitigation Practices for Embedded Systems • Case Study and Workshop
  • 10. TAKE THIS COURSECyber Security Applied to Embedded Systems https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/
  • 11. TAKE THIS COURSECyber Security Applied to Embedded Systems https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/ Cybersecurity 101 • What is Cybersecurity? • Basic principles of CIA • Confidentiality • Embedded system’s critical information • Application code and surveillance data • Unauthorized entities and Integrity • Availability and mission objectives • Cyber Risks applied to Embedded Systems • Principles and practices designed to safeguard your embedded system • Hacking tools and entry points • Encryption and authentication, Data Integrity • Vulnerability analysis 101 and Mitigation 101 • Networking and network attacks • Role of wireless networks in the embedded systems • Embedded hardware and firmware analysis and reverse engineering • Embedded system security Threats • Intrusion and Virus, Worm, Trojan Horse (Malware) • Spyware , DoS and Secure software fundamentals
  • 12. TAKE THIS COURSECyber Security Applied to Embedded Systems https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/ Introduction to Embedded Systems • Embedded Systems 101 • Hardware Architecture • Software Development • Microprocessor Primer • Basic architecture • Programmer’s view • Embedded Operating Systems • Case Study: Embedded mmWave Radar System • Embedded Systems Engineering
  • 13. TAKE THIS COURSECyber Security Applied to Embedded Systems https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/ Embedded System Vulnerability Analysis • Networking and network attacks • Wireless networks and embedded systems • Embedded hardware and firmware analysis • Exploiting Embedded Devices • The stages of router exploitation • Initial Reconnaissance and Exploitation • Firmware Unpacking and Modification • Detecting, Extracting and Analysis • Cross Compiling • Modification and Creation of new firmware • Persistent Dynamic Backdoor • Firmware analysis and extraction • Finding and exploiting logic flaws • Firmware emulation and debugging • Finding and exploiting real-world overflows • Foundations of cyber security and emerging threats • Hacking/exploitation techniques, tools and entry points • Defensive technologies: Encryption and authentication
  • 14. TAKE THIS COURSECyber Security Applied to Embedded Systems https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/
  • 15. TAKE THIS COURSECyber Security Applied to Embedded Systems https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/ Exploiting Real Time Operating Systems • Basic introduction to the concept of Real Time Operating Systems • Overview of MIPS architecture and design • Firmware analysis of our first target device • Debugging our first target device • Augmenting IDA’s auto analysis • Searching for backdoors • How not to crash your target • Hardware & firmware analysis • Identifying functions without a symbol table • Low-hanging crypto • Breaking custom crypto • Practical exploitation of crypto bugs • More firmware analysis • Augmenting IDA’s auto analysis • Chip backdoors and Hidden manufacturer menus • Hardware Hacking, Basic electronics and circuit analysis • Analog/digital communications • Common inter-component protocols
  • 16. TAKE THIS COURSECyber Security Applied to Embedded Systems https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/ Securing Embedded Systems Interfaces and Protocols • Embedded Systems Communication Protocols • Universal Asynchronous Receiver/Transmitter (UART) • Serial Peripheral Interface (SPI) • Joint Test Action Group (JTAG) • Inter-integrated Circuit (I2C) • I2C bus, CAN bus and FireWire bus • USB and Parallel protocols • PCI bus and ARM bus • Wireless protocols • IrDA • Bluetooth and Bluetooth LE (BLE) • IEEE 802.11 • NFC and RFID • 802.15.4 • 6LowPAN and Thread • Zigbee • Z-Wave
  • 17. TAKE THIS COURSECyber Security Applied to Embedded Systems https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/
  • 18. TAKE THIS COURSECyber Security Applied to Embedded Systems https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/ Cybersecurity Attacks and Best Mitigation Practices for Embedded Systems • Non-Invasive Hardware Reverse Engineering • Component identification • Tracking PCB traces • Re-producing schematic and block diagrams • Bus Sniffing • Interface Analysis • Communications protocols sniffing • Decoding and deciphering captured bits • Critical data identification and detection • Component removal and replacement • Dealing with surface mount components • Electronics and circuit analysis • Understanding your tools and their effects on the circuit • Understanding the circuit and its effect on your tools • Security Measures
  • 19. TAKE THIS COURSECyber Security Applied to Embedded Systems https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/ Case Study and Workshop • Cybersecurity Analysis of Embedded Systems used in unmanned aircraft system (UAS) • Design Process • Embedded system CONOPS • Mission objectives • CONOPS • Test and evaluation • Functional requirements • Threat analysis and System design • Security requirements • Performance evaluation • Security evaluation • System Implementation Security • Attack surface, Boot process, system data, and software • Physical attack surface and Root of trust establishment • Trust hardware and software components , Trusted platform module (TPM) • Operating system (OS) and Mission-specific application code (Apps) • Field-programmable gate array (FPGA) • BIOS, Boot process, Startup and Trusted computing base (TCB)
  • 20. TAKE THIS COURSECyber Security Applied to Embedded Systems https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/
  • 21. TAKE THIS COURSE Price: $1999.00 Length: 2 Days https://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/ Cyber Security Applied To Embedded Systems
  • 22. Contact Tonex Training Expert Dallas, TX: 1400 Preston Rd., Suite 400 Plano, Texas 75093 Tel: +1-972-665-9786 Washington, DC: 1025 Connecticut Ave, NW Suite 1000 Washington, DC 20036 Tel: +1-202-327-5404 International: +1-214-762-6673 Fax: +1-972-692-7492 Visit Tonex website https://www.tonex.com/