Course Description
Short Course | 18 hours | 1.8 CEUs | $2,295
Product security goes beyond the traditional information security CIA triad of confidentiality, integrity, and availability, and includes the expectation that products are secure. In this class cybersecurity is applied to hardware and software across the board with a focus on embedded systems and preventing malicious access and use. Over the last few years there has been an increase of concern regarding cybersecurity, systems, and software, especially with the Internet of Things expansion of massive interconnectivity.
In this course, Product Cybersecurity 101, the fundamentals of product cybersecurity are explored with a focus on embedded systems to illustrate unique vulnerabilities that are commonly exploited. Students learn about methods and techniques considering cybersecurity measures in the entire system life cycle and acquisition. Secure Embedded Systems include many procedures, methods and techniques to seamlessly integrate cybersecurity within embedded system software & hardware.
PSE050 is the first course in the Product Security Professional Certificate. To complete the certificate students will also enroll in PSE100, & PSE200. Click on each course link for more details and to add to cart.
Course Outline
- Cybersecurity 101
- Introduction to Embedded Systems
- Embedded System Vulnerability Analysis
- Exploiting Real Time Operating Systems (RTOS)
- Securing Embedded Systems Interfaces and Protocols
- Securing Communications Protocols and Interfaces
- Cybersecurity Attacks and Best Mitigation Practices for Embedded Systems
Learner Outcomes
Upon completion of this course, participants will learn about:
- Fundamentals of cybersecurity
- Cybersecurity applied to product analysis, design, engineering and development
- Fundamentals of embedded systems
- Fundamentals of hardware/firmware/RTOS analysis and design
- Embedded hardware, firmware and software analysis to detect vulnerabilities
- Foundation knowledge of embedded systems cybersecurity threats, risks, mitigation strategies
- Fundamentals of communication protocols, wired and wireless networks, information and network attacks used in embedded systems (WiFi, Bluetooth/BLE, ZigBee, 3G/4G/5G/5G Advanced/6G cellular, SATCOM and tactical HF/VHF/UHF/SHF including mmWave and Sub-THZ in 6G)
- Risk assessment techniques and methodologies using defensive tools for mitigating risk and vulnerabilities
Prerequisites
Information Security Essentials (SEC100) or equivalent experience.Duration
18 Hours | 3 Days or 6 NightsTestimonials
"I really enjoyed the course. The examples presented to provide context to the course were great. The various Product Security tracks offers a great means for career specialization." - Seth*Academic Unit eligibility to be determined by college/university in which you are enrolled in a degree seeking program.