Dive into the world of embedded security!
ESCRYPT has long since stopped teaching only the basics of cryptography in its training courses. Instead, the company channels its years of experience in embedded security, gained during numerous industry projects, to provide practical examples and the latest technological developments.
ESCRYPT is the leading systems supplier for embedded security, with many years of experience. Its training courses impart a solid understanding of security for embedded devices, thereby laying the foundation for the development of secure technologies.
In this training, we teach the fundamental basics to IT security and cryptography. With this knowledge, you'll be able to understand the basic messages of security concepts and understand the language of security professionals.mehr erfahren
A solid security risk analysis (SRA) is the basis of a thorough security concept and thus of all security-related steps in the production process. In this training, we teach the necessary IT security basics and explain an established and approved SRA methodology that bases on the Common Criteria. The theoretical part is complemented by a half-day practical exercise.mehr erfahren
Basic IT security training that covers organizational and technical aspects of product development. The training focuses on security tasks in classic and agile development processes, cryptography, and basic IT security measures.mehr erfahren
Advanced IT security training that focuses on technologies for connected or IoT products. The training covers both basic connectivity topics as well as detailed information to IoT protocols and technologies.mehr erfahren
Few things stir the automotive world to such strong emotion as the prospect of selfdriving vehicles. Where some see enormous gains in comfort, convenience, and safety, others are concerned about automotive autonomy and hackers attacking their vehicles. Yet the need for effective embedded security in vehicles was on the rise before the advent of the automated vehicle. Today's vehicles already need protection against odometer manipulation, unwanted access to vehicle electronics, and many other threats.
This training provides special IT security knowledge for the automotive industry. In doing so, we follow a holistic approach that leads from secure ECU design to secure on-board networking and secure connected vehicles. Practical exercises and examples complement the discussed contents.mehr erfahren