Now you can earn IEEE Professional Development Hours by attending CEC courses.

Getting Started with Secure Software

April 20, 2020, to April 24, 2020
Continuing Education Center
Digi-Key

Jacob Beningo

Jacob Beningo is an embedded software consultant who currently works with clients in more than a dozen countries to dramatically transform their businesses by improving product quality, cost and time... More

The number of devices connecting to the internet each year is growing at an exponential rate. In fact, Arm expects there to be over 1 trillion connected devices by 2035. While the functionality for so many devices can hardly be conceived now, the one thing that each device is going to need is a secure software implementation to protect it from the numerous threats. For many developers, though, security is an intimidating word. It’s not completely clear to embedded systems developers what security is or how to implement it correctly. In this course, we will explore what embedded software developers need to understand in order to develop secure IoT applications. We will look at how to develop secure applications starting with a systems threat analysis and then moving to examining different technologies and software frameworks.

April 24 - Day 5 - Secure Frameworks and Ecosystems

Implementing a secure solution from scratch can be intimidating, but the fact is that developers don’t have to start from scratch. There are several secure frameworks and solutions already available that developers can leverage in order to accelerate the secure software implementation. In this...
April 24, 2020 - 2:00pm EDT

April 23 - Day 4 - Secure Boot and the Root-of-Trust

Establishing a root-of-trust (RoT) and securely booting a system can be challenging for developers who are new to embedded security. These concepts form the bases of a secure solution and must be mastered. In this session, we will explore important concepts such as root-of-trust, chain-of-trust and...
April 23, 2020 - 2:00pm EDT

April 22 - Day 3 - Architecting a Secure Solution

Secure solutions are often achieved through layers of system isolation. There are several different technologies that developers can leverage to ensure that they are able to isolate their software successfully. In this session, we are going to examine the solutions that are available to isolate the...
April 22, 2020 - 2:00pm EDT

April 21 - Day 2 - Performing a Security Threats Analysis

One common mistake that teams often make when attempting to secure their systems is to try to bolt security on at the end. A security threats analysis must be performed early in the development cycle in order to appropriately identify the assets that will be protected, the threats those assets face...
April 21, 2020 - 2:00pm EDT
Subscribe to Getting Started with Secure Software