This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
The CEC will get you up to speed quickly on a host of technologies you've been meaning to study via a series of 45-minute online lessons taught by our faculty of expert tutors.
For our second class, we will look at hardware security needs – from code protection to guarding against unauthorized board modification. We will look at many of the features that are being added to high-security microcontrollers in order to meet...
For our third class, we will delve into the security and vulnerabilities of data within the IoT. We will cover issues from the collection and reporting of incorrect or unreliable (“tainted”) data to keeping the data secure and intact as it travels...
In this leadoff class, we will present an overview of the Micrium μC/OS II/III kernel-based RTOS. We will look at the basic structure and how an RTOS works in foreground / background operations and the basic principles and operation in an RTOS. We...
For our second class, we will outline the details of the maker program and how to participate. We will look at the requirements that we must meet to qualify for the program and what the differences are with the standard commercial license. We will...
For our third class, we will begin to delve into the elements of μC/OS III, beginning with the concept of kernel-based applications then how we install and set up the system to build our first μC/OS III application on our K64 target board.
In this penultimate class, we will look at the challenges of overall network security. We will cover everything from secure communications protocols to secure commissioning and decommissioning of nodes.
In this penultimate class, we will write the tasks for our application. We will examine how we will set up priorities and the events that will drive our application. We will also determine what communication we need between tasks for...
Now that we have learned the basic challenges of securing the IoT, we will look at the other issues that we may face, including the #1 security weakness in essentially every IoT implementation. We will look at some of the tools and test methods...
Now that we have built and tested our basic tasks, we will look at how we can add synchronization primitives, mutual exclusion, and inter-task communication to assure that our tasks work together properly without interference and properly share...