This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
The CEC will get you up to speed quickly on a host of technologies you've been meaning to study via a series of 45-minute online lessons taught by our faculty of expert tutors.
This class puts everything from the previous four days together. We will review general security mitigation principles and then learn how to apply knowledge of SCADA specific threats, vulnerabilities, and attack methods to formulate pragmatic and...
Once you know the threat sources and the vulnerabilities within your own systems, knowing the methods of how these systems can be attacked is a key component to formulating a pragmatic and efficient mitigation strategy. This class will look at the...
From people to processes to technology, vulnerabilities are the reason security is needed. Unfortunately, the sheer number of vulnerabilities in existence makes dealing with them a daunting task. This class helps students understand...
Once your embedded system is deployed it is a target, either directly by "invasive" probing of the actual board or via network-based attacks. Protecting your systems from these threats requires the use of advanced techniques like establishing a...
Modern techniques for security and authentication use a few key cryptographic concepts and algorithms to protect data and processes in embedded systems. This class provides an introduction to the most common techniques and standards, so you can...
One of the most vulnerable parts of an embedded system is the design itself. How can you protect your design from copying, cloning, overbuilding, and reverse engineering? This class will cover some key techniques that can protect your design from...