• ESCRYPT Trainings

    Security trainings

    Dive into the world of embedded security!

ESCRYPT has long since stopped teaching only the basics of cryptography in its training courses. Instead, the company channels its years of experience in embedded security, gained during numerous industry projects, to provide practical examples and the latest technological developments.

ESCRYPT is the leading systems supplier for embedded security, with many years of experience. Its training courses impart a solid understanding of security for embedded devices, thereby laying the foundation for the development of secure technologies.

Eingebettete Sicherheit für Fahrzeuge

Embedded security for vehicles

Few things stir the automotive world to such strong emotion as the prospect of selfdriving vehicles. Where some see enormous gains in comfort, convenience, and safety, others are concerned about automotive autonomy and hackers attacking their vehicles. Yet the need for effective embedded security in vehicles was on the rise before the advent of the automated vehicle. Today’s vehicles already need protection against odometer manipulation, unwanted access to vehicle electronics, and many other threats.

The “Embedded security for vehicles” seminar series was designed specifically for the automotive industry and offers the appropriate level of detail for management as well as for product managers and developers.

mehr erfahren

Embedded security for vehicles: For managers

This seminar is for all levels of management that require a basic understanding of security so that they can establish suitable, cost-effective security measures in their own areas of responsibility.

Seminar topics:
  • Security threats to automotive systems
  • Secure development
  • Multilevel protection concepts
  • Key security technologies for the challenges of today and tomorrow

Security in an automotive context (Parts 1 and 2)

This training course is designed for product managers, project managers, and product developers for whom application-based knowledge of embedded security is an important tool in secure automotive development. Part 1 provides a broad introduction to the fundamentals of security and can be held as a stand-alone session for employees who do not require further detail. Part 2 builds on the fundamentals by going into greater depth with exercises and case examples.

Part 1 (one day)
  • Security fundamentals
  • Risk analysis
  • Algorithms and protocols
  • Secure product lifecycle
  • Security principles
Part 2 (two days)
  • Security fundamentals
  • Tools and processes
  • Use cases and hardware-based protection
  • Secure software development
Secure product design

Secure product design

When developing embedded devices, the earlier that security functions can be taken into consideration, the easier they are to implement. ESCRYPT’s “Secure product design” course provides all the information necessary for secure product development.

mehr erfahren
Seminar topics:
  • Security fundamentals
  • Secure software development for the entire product lifecycle
  • Algorithms and protocols
  • Authentication and authorization
  • Security principles
  • Choice of secure coding or fundamentals of risk analysis

“Secure product design” is equally suitable for product managers, project managers, and product developers.

Security für vernetzte eingebettete Geräte

Security for connected embedded devices

With the increasing connectivity of embedded systems, the security requirements for devices are also changing. In the “Security for connected embedded devices” course, participants learn the fundamentals for products that feature secure communication.

mehr erfahren
Seminar topics:
  • Use cases for connected devices
  • Fundamentals of connectivity
  • Authentication in depth
  • Secure communication
  • Securing communication interfaces
  • Web services

This course is aimed at product managers, project managers, and product developers who are responsible for the analysis and definition of security requirements and their implementation in protection concepts for connected systems. Participants need to have a firm grasp of the cryptography fundamentals as taught in the “Secure product design” course.

Internet of Things (IoT) Product Security

Internet of Things (IoT) Product Security

Attacks on connected systems have considerably increased over the recent years – products from smart lamps brand-new vehicles were affected – and have been discussed in the mass media, as well as in relevant journals. The reasons for this increase may vary, but the lack of security awareness of manufacturers and, in this context, missing activities for the protection of products and product development processes stand out. With the Internet of Things being a central technology for the near future, this draws a dramatic picture of the IT security situation against the background of an increasing connectivity and digitalization of industrial and consumer products.

These challenges can be addressed successfully by implementing both corresponding processes in the development and operation of IT systems, as well as reasonable IT security measures that are specially tailored for the use cases and technologies in the IoT domain. The implementation of the latter protection measures, however, is non-trivial and requires a thorough knowledge of the capabilities and limitations of IT security and a solid understanding of the different network technologies. This training provides the necessary cryptographic and network technology basics and furthermore, an overview over the capabilities and limitations of the secure configuration of IoT systems.

mehr erfahren
Content
  • Basics of IT security and computer networks
  • Cryptography basics
  • Important aspects of access control
  • Basics of authentication and authorization in connected systems
  • Secure Communication
  • Certificate-based authentication
  • Web service security

This course is aimed at Product managers (or project managers) that need to establish a solid understanding about general security principles, processes and tools that are necessary for secure product design, and at product engineers (or product security officers) that are responsible for analyzing and defining security requirements and for defining security concepts. No IT security background is required.

Language:
ISO 9001-2008 Home