• ESCRYPT Trainings

    Security trainings

    Dive into the world of embedded security!

ESCRYPT has long since stopped teaching only the basics of cryptography in its training courses. Instead, the company channels its years of experience in embedded security, gained during numerous industry projects, to provide practical examples and the latest technological developments.

ESCRYPT is the leading systems supplier for embedded security, with many years of experience. Its training courses impart a solid understanding of security for embedded devices, thereby laying the foundation for the development of secure technologies.

Security basics

Security basics

In this training, we teach the fundamental basics to IT security and cryptography. With this knowledge, you'll be able to understand the basic messages of security concepts and understand the language of security professionals.

mehr erfahren
Participants
  • Product or project managers who need to establish a basic understanding about IT security and basic cryptographic mechanisms.
Training goals
  • Get to know different aspects of security (e.g., theory vs. practice, challenges, …).
  • Learn and understand security basics (e.g., basic terminology).
  • Establish fundamental knowledge about cryptographic tools, algorithms, and protocols.
  • Get an overview of important aspects of access control.
Requirements
  • Basic technical understanding of mathematical and information technology (engineering level).
Content
  • Security basics
  • Cryptographic tools, algorithms, and protocols
  • Overview of authentication and authorization
Duration
  • 1 day
Security risk analysis

Security risk analysis

A solid security risk analysis (SRA) is the basis of a thorough security concept and thus of all security-related steps in the production process. In this training, we teach the necessary IT security basics and explain an established and approved SRA methodology that bases on the Common Criteria. The theoretical part is complemented by a half-day practical exercise.

mehr erfahren
Participants
  • Product or project managers who need to understand the methodology of a security risk analysis in the context of a product development process.
  • Security managers who are responsible for conducting security risk analyses during the product development process.
Training goals
  • You understand the necessity of security threat and risk analyses.
  • You understand the basic steps of security threat and risk analyses.
Requirements
  • Basic knowledge of product development processes.
Content
  • Security Basics.
  • Methodology of security risk analyses with practical group exercise.
Duration
  • 1 day
Secure product design

Secure product design

Basic IT security training that covers organizational and technical aspects of product development. The training focuses on security tasks in classic and agile development processes, cryptography, and basic IT security measures.

mehr erfahren
Participants
  • Product or project managers who need to establish a solid understanding about general security principles, processes and tools that are necessary for secure product design
  • Product engineers who are responsible for analyzing and defining security requirements and for defining security concepts
Training goals
  • Get to know different aspects of security (e.g., theory vs. practice, challenges, …)
  • Learn and understand security basics (e.g., basic terminology)
  • Find out how to set up a secure software development lifecycle
  • Establish fundamental knowledge about cryptographic tools, algorithms, and protocols
  • Understand important aspects of access control (authentication and authorization)
  • Learn to apply main security principles
  • Comprehend secure coding techniques
Requirements
  • Basic technical understanding of mathematical and information technology (engineering level)
Content
  • Security basics
  • Secure software development lifecycle
  • Cryptographic tools, algorithms, and protocols
  • Authentication and authorization
  • Security principles
  • Secure coding
Duration:
  • 2 days
Costs:
  • 1600 Euro
Available Courses
  • Secure Product Design
    November 19-20, 2018, Munich , Germany - 12 Places -
    Registration Form
Download flyer as PDF
Secure connected products

Secure connected products

Advanced IT security training that focuses on technologies for connected or IoT products. The training covers both basic connectivity topics as well as detailed information to IoT protocols and technologies.

mehr erfahren
Participants
  • Product or project managers who need to establish a solid understanding about secure design of connected or IoT products
  • Product engineers who are responsible for analyzing and defining security requirements and for defining security concepts of connected or IoT products
Training goals
  • Understand distinct security aspects regarding connectivity
  • Understand important aspects of advanced access control
  • Establish an overview knowledge of secure protocol configurations and pitfalls
  • Learn the basics about protocols for the internet of things
  • Comprehend the threats to interfaces and how to alleviate them
  • Find out the basics about web services and possible vulnerabilities
Requirements
  • Basic technical understanding of mathematical and information technology (engineering level)
  • Basic technical understanding of cryptography and IT security (i.e. knowledge from secure product design or equivalent)
Content
  • Connectivity basics: background and product case study.
  • Advanced identification and authentication.
  • Secure communication
  • Interface protection
  • Web services security
Duration
  • 1 day
Costs
  • 900 Euro
Available Courses
  • Secure Connected Products:
    November 21, 2018, München, Germany - 15 Places -
    Registration Form
Eingebettete Sicherheit für Fahrzeuge

Automotive security

Few things stir the automotive world to such strong emotion as the prospect of selfdriving vehicles. Where some see enormous gains in comfort, convenience, and safety, others are concerned about automotive autonomy and hackers attacking their vehicles. Yet the need for effective embedded security in vehicles was on the rise before the advent of the automated vehicle. Today's vehicles already need protection against odometer manipulation, unwanted access to vehicle electronics, and many other threats.

This training provides special IT security knowledge for the automotive industry. In doing so, we follow a holistic approach that leads from secure ECU design to secure on-board networking and secure connected vehicles. Practical exercises and examples complement the discussed contents.

mehr erfahren
Participants
  • Product or project managers who need to establish a solid understanding about automotive security principles for secure design of ECUs, the on-board network or connected vehicle services.
  • Automotive product engineers who are responsible for analyzing and defining security requirements and for defining security concepts.
Training goals
  • Get to know current aspects of automotive security
  • Discover a holistic view on automotive security
  • Understand the challenges and possibilities to develop secure ECUs
  • Understand the challenges and possibilities of secure networking
  • Understand the challenges and possibilities of secure connected vehicles
  • Learn how to apply the theories from the learning sections in real-world use cases
  • Learn about the most important automotive security standards
Requirements
  • Basic technical understanding of automotive systems (engineering level)
  • Basic technical understanding of cryptography and IT security (i.e. knowledge from secure product design or equivalent)
Content
  • Introduction to automotive security
  • Holistic automotive security
  • Secure ECU design
  • Secure on-board networking
  • Secure connected vehicles
  • Automotive security standards
Duration
  • 2 days
Language:
ISO 9001-2008 Home