Dive into the world of embedded security!
ESCRYPT has long since stopped teaching only the basics of cryptography in its training courses. Instead, the company channels its years of experience in embedded security, gained during numerous industry projects, to provide practical examples and the latest technological developments.
ESCRYPT is the leading systems supplier for embedded security, with many years of experience. Its training courses impart a solid understanding of security for embedded devices, thereby laying the foundation for the development of secure technologies.
Few things stir the automotive world to such strong emotion as the prospect of selfdriving vehicles. Where some see enormous gains in comfort, convenience, and safety, others are concerned about automotive autonomy and hackers attacking their vehicles. Yet the need for effective embedded security in vehicles was on the rise before the advent of the automated vehicle. Today’s vehicles already need protection against odometer manipulation, unwanted access to vehicle electronics, and many other threats.
The “Embedded security for vehicles” seminar series was designed specifically for the automotive industry and offers the appropriate level of detail for management as well as for product managers and developers.mehr erfahren
This seminar is for all levels of management that require a basic understanding of security so that they can establish suitable, cost-effective security measures in their own areas of responsibility.
This training course is designed for product managers, project managers, and product developers for whom application-based knowledge of embedded security is an important tool in secure automotive development. Part 1 provides a broad introduction to the fundamentals of security and can be held as a stand-alone session for employees who do not require further detail. Part 2 builds on the fundamentals by going into greater depth with exercises and case examples.
When developing embedded devices, the earlier that security functions can be taken into consideration, the easier they are to implement. ESCRYPT’s “Secure product design” course provides all the information necessary for secure product development.mehr erfahren
“Secure product design” is equally suitable for product managers, project managers, and product developers.
With the increasing connectivity of embedded systems, the security requirements for devices are also changing. In the “Security for connected embedded devices” course, participants learn the fundamentals for products that feature secure communication.mehr erfahren
This course is aimed at product managers, project managers, and product developers who are responsible for the analysis and definition of security requirements and their implementation in protection concepts for connected systems. Participants need to have a firm grasp of the cryptography fundamentals as taught in the “Secure product design” course.
Attacks on connected systems have considerably increased over the recent years – products from smart lamps brand-new vehicles were affected – and have been discussed in the mass media, as well as in relevant journals. The reasons for this increase may vary, but the lack of security awareness of manufacturers and, in this context, missing activities for the protection of products and product development processes stand out. With the Internet of Things being a central technology for the near future, this draws a dramatic picture of the IT security situation against the background of an increasing connectivity and digitalization of industrial and consumer products.
These challenges can be addressed successfully by implementing both corresponding processes in the development and operation of IT systems, as well as reasonable IT security measures that are specially tailored for the use cases and technologies in the IoT domain. The implementation of the latter protection measures, however, is non-trivial and requires a thorough knowledge of the capabilities and limitations of IT security and a solid understanding of the different network technologies. This training provides the necessary cryptographic and network technology basics and furthermore, an overview over the capabilities and limitations of the secure configuration of IoT systems.mehr erfahren
This course is aimed at Product managers (or project managers) that need to establish a solid understanding about general security principles, processes and tools that are necessary for secure product design, and at product engineers (or product security officers) that are responsible for analyzing and defining security requirements and for defining security concepts. No IT security background is required.