This course provides an introductory look at what security testing is, its purpose, the two main types of security testing, and the key differences between these types.
By the end of this course, you will be able to:
This module introduces the common software weaknesses and mitigation strategies with the top 10 secure coding practices. Learn how flaws get into code and how these can be avoided whilst incorporating secure coding into your day-to-day work.
By the end of this course, you will be able to:
This module will provide an understanding of the security challenges associated with software (SW) and firmware (FW) updates in automotive, identify security practices and building blocks to address these challenges and support software developers in implementing and delivering secure software updates.
By the end of this course, you will be able to:
This training provides an overview of the threat analysis and risk assessment (TARA) methodology in terms of context establishment, security and privacy threat analysis, risk assessment and risk treatment.
By the end of this course, you will be able to:
This training introduces the security risk analysis process and provides insights in modelling a system with data flow diagrams, attack trees and STRIDE threat analysis techniques as well as ISO 27005 risk treatment strategies.
By the end of this course, you will be able to:
This training provides an overview and creates awareness on privacy and data protection in automotive using Continental as an illustrative example.
By the end of this course, you will be able to:
This training provides a common understanding about secure boot to ensure the authenticity and integrity of software before its execution.
By the end of this course, you will be able to:
This training provides an overview of different types of secure hardware components, their role as trust anchors and their main features.
By the end of this course, you will be able to:
This training module gives an overview of key aspects, fundamentals, standards, and approaches to consider security in automotive products using Continental as an illustrative example. Furthermore, typical cyber security vulnerabilities and effective countermeasures to develop secure automotive products will be addressed.
By the end of this course, you will be able to answer following questions:
In this training will focus on the fundamental attributes of IT security and security risk analysis. Different security terminologies and their relationship to the automotive domain are explained.
By the end of this course, you will be able to: