Training at a Glance

Vector illustration of an audience watching an instructor on screen

Format

  • Self-paced eLearning
  • Interactive exercises and quizzes
  • Scheduled live mentoring
  • Scale to multiple groups

Vector illustration of 3 people serving as an audience

Audience

  • Anyone working with automotive embedded systems
  • Decision-makers to engineers with technical and non-technical backgrounds

Vector illustration of a stopwatch timer

Duration

  • 4 courses
  • 4 weeks total
  • 16 hours self-paced eLearning
  • 4 hours live mentoring

Vector illustration of certificate or diploma

Outcomes

  • Identify and understand threats
  • Learn relevant automotive attack and defense mechanisms
  • Be able to evaluate and secure automotive systems

Ensure Security of Automotive Embedded Systems

Modern cars increasingly depend on complex digital systems to manage various operations, expanding their potential attack surface and making them prime targets for cyber threats. Ensuring the security of these systems is now essential for all automotive teams.

This training addresses the challenges of evolving cybersecurity in the automotive sector by equipping teams with a solid security mindset. It significantly mitigates the risk of cyber-attacks and enhances overall vehicle reliability and security. Participants will gain valuable insights and practical knowledge to improve the security and resilience of automotive embedded technologies.

A proactive approach to cybersecurity protects a company’s reputation and results in substantial cost savings by preventing costly recalls, reducing liability from potential security breaches, and avoiding the financial impact of cyber-attacks. Investing in security training and defense strategies ultimately translates into competitive advantages, such as increased consumer trust and market share, contributing to long-term profitability and sustainability in the industry.

Training Outline

  • Introduction to security engineering
  • Technical terms, definitions, and key concepts in automotive security
  • Threat analysis and risk assessment (TARA) and standards
  • Overview of industry standards and frameworks
  • Introduction to the TARA methodology
    • Actors in embedded systems: Understanding the various assets, components, and threat modeling in embedded and automotive systems
    • Introduction to risk assessment: Basics of assessing security risks in automotive contexts

Introduction to automotive systems

  • Approach to evaluations: Methodologies for assessing system vulnerabilities
  • Printed Circuit Boards (PCBs): Understanding PCB and component analysis of ECUs in automotive systems
  • Virtual machines (VMs)
    • Procedure: Setting up VMs for automotive security testing
    • Screenshots: Demonstrating VM setup

Digital interfaces and OSI layers

  • UART interface
    • Understanding UART in the OSI model
    • Practical tips for locating UART in automotive systems
  • JTAG interface
    • Introduction to JTAG and its role in automotive security
    • Methods for identifying JTAG interfaces

Automotive interfaces and protocols

  • Controller Area Network (CAN)
    • Connecting to a CAN bus
    • Identifying and analyzing CAN signals (differential signals)
    • Using CAN utilities to read and write messages
    • Tools: SavvyCAN, Python-can-remote
  • Automotive ethernet
  • Techniques for identifying automotive ethernet in a system
  • FlexRay
  • Power Line Communication (PLC)
Diagnostics in automotive systems
  • Unified Diagnostic Services (UDS): Theory and practical application in vehicle diagnostics
  • Diagnostics over IP (DoIP): Understanding DoIP in modern automotive systems
Practical hands-on session
  • Participants engage in practical exercises using diagnostic tools to analyze and secure automotive systems
Advanced hands-on session
  • Continuation of diagnostics: Deep dive into UDS and DoIP applications
  • Case Studies: Real-world scenarios to apply learned concepts

Wrap-up and Q&A

Interested in this service? Reach out to learn more.