Dive into the world of embedded security!
ESCRYPT has long since stopped teaching only the basics of cryptography in its training courses. Instead, the company channels its years of experience in embedded security, gained during numerous industry projects, to provide practical examples and the latest technological developments.
ESCRYPT is the leading systems supplier for embedded security, with many years of experience. Its training courses impart a solid understanding of security for embedded devices, thereby laying the foundation for the development of secure technologies.
Advanced IT security training that focuses on ISO/SAE DIS 21434 requirements and cybersecurity management overall in the context of the UN regulation 155 (UNECE WP.29). The training covers subjects like risk assessment as well as the different engineering phases from concept to development and post development.mehr erfahren
A solid threat analysis and risk assessment (TARA) is the basis of a thorough security concept and thus of all security-related steps in the development process. In this advanced coaching, we explain an established and approved TARA methodology that is based on the Common Criteria and fully aligned with ISO/SAE DIS 21434.
The theoretical part is complemented by a practical part. Here, the customer team creates a TARA for one of their systems, while the ESCRYPT trainer provides support and reviews.mehr erfahren
Basic IT security training that covers organizational and technical aspects of product development. The training focuses on security tasks in classic and agile development processes, cryptography, and basic IT security measures.mehr erfahren
Advanced IT security training that focuses on technologies for connected or IoT products. The training covers both basic connectivity topics as well as detailed information to IoT protocols and technologies.mehr erfahren
Few things stir the automotive world to such strong emotion as the prospect of selfdriving vehicles. Where some see enormous gains in comfort, convenience, and safety, others are concerned about automotive autonomy and hackers attacking their vehicles. Yet the need for effective embedded security in vehicles was on the rise before the advent of the automated vehicle. Today's vehicles already need protection against odometer manipulation, unwanted access to vehicle electronics, and many other threats.
This training provides special IT security knowledge for the automotive industry. In doing so, we follow a holistic approach that leads from secure ECU design to secure on-board networking and secure connected vehicles. Practical exercises and examples complement the discussed contents.mehr erfahren