SlideShare a Scribd company logo
1 of 20
In the past decade, the automotive industry has
undergone tremendous technological changes in terms of
connectivity and personal mobility.
Modern cars are more and more like computers rather
than mechanical products. It is not uncommon for
modern cars to have remote connectivity and high-tech
features, such as touch-sensitive dashboards, which can
keep themselves up to date through regular software
updates.
The risk of a cyber attack will depend on the potential
outcome and the factors that determine the likelihood of
the attack.
In the automotive industry, the consequences can be
severe-if safety-related functions are compromised, it can
cause injury or death, and if a large number of vehicles
are threatened or required to be recalled, it can cause
serious damage to reputation.
In the new digital age, due to the vehicle’s wireless
communication capabilities, mobile devices (such as
cellular phones or tablets connected to the vehicle via
USB, Bluetooth or Wi-Fi) may have vulnerabilities inside
or inside, and this problem is becoming more and more
disturbing Third-party equipment connected through the
vehicle diagnostic port.
As the digital transformation of the automotive industry
exposes new cybersecurity threats, this is a serious
problem. Before the digital age and the advent of 5G
architecture, what happened in your car usually stayed in
your car.
Of course this is no longer the case. The influx of digital
innovation from infotainment connections to over-the-air
(OTA) software updates is turning cars into clearing
houses.
In cooperation with the National Institute of Standards
and Technology Cybersecurity Framework, the
automotive industry has been actively responding to
automotive cybersecurity challenges and continuously
exploring ways to mitigate related risks.
Therefore, regulators and governments have worked
hard to ensure that network security has become an
indispensable focus at all levels of the automotive supply
chain.
Adding security components to automotive embedded
systems may hinder the function of the system and affect
the real-time performance of mission-critical systems.
Automotive system and software engineers, testers,
hardware designers, developers, and security analysts
need a well-defined method to simultaneously design
automotive embedded functions and network security.
Secure automotive embedded systems may use
security coprocessors to cryptographically ensure
the confidentiality and integrity of the system
while maintaining functionality.
Tonex's Automotive Cybersecurity Training
Automotive Cyber ​​Security Training (Network Security
for Automotive Embedded Systems) is a 3-day course.
Participants will discuss the basic principles of
embedded systems and the application of cyber security
in vehicles to illustrate unique vulnerabilities that are
commonly exploited.
Learn about:
• Protection of automotive electronic systems
• Embedded systems
• Communication networks
• Controller Area Network (CAN bus)
• Ethernet
• Control algorithms
• Software
• Threat agents
• Vulnerabilities
• Underlying data from malicious attacks, damage,
unauthorized access, or manipulation.
Participants will study methods and technologies
related to the entire automotive system life cycle and
cyber security measures during the purchase
process. Security embedded systems in automotive
applications include many programs, methods and
technologies that can seamlessly integrate network
security into automotive embedded system software.
Participants will discover automotive network
protection that applies to all or any automotive data,
applications and systems.
Who Should Attend:
• Chief Product Security Officers (CPSO)
• Control Platform
• Developers working with embedded systems
• Embedded software engineers and testers
• Ethernet and CAN Bus Software Engineers and
Testers, Hardware Testers
• Functional Safety Electrical Engineering
• Information security professionals
• Machine Learning Platform Engineers and Managers
• Mechatronics Engineer, Sensor Cleaning Engineers
and PMs
Who Should Attend:
• Application developers
• Automotive Engineering Manager
• Automotive Product & Infrastructure
• Automotive Verification and Validation Engineers
and Managers
• Autonomous Vehicle Development Software and
Hardware Engineers
• Chief Security Officers (CSO)
• Chief Information Security Officers (CISO)
• Chief Information Officers and IT Security directors
Who Should Attend:
• Product & Infrastructure Engineers and PMs
• Product/process designers and engineers
• Reliability Engineers
• Reliability, Safety, Quality Assurance and Security
Engineers
• Software Engineer – FPGA Design
• Software Engineer Robotics – Controls
• System, Software and Hardware Test, Evaluation and
Debug Engineers
• Security Operations Center (SOC) Managers and
Team Leaders
The Main Points of This Course Include:
• Hardware and firmware analysis and design basis in
automotive embedded design
• Vulnerabilities in automotive embedded systems
• Embedded hardware and firmware analysis to
detect vulnerabilities
• Master the basic knowledge of automotive cyber
security threats, risks and mitigation strategies
applicable to embedded systems
• Exploitable vulnerabilities in automotive embedded
systems and technologies and strategies for systems
engineering embedded systems
The Main Points of This Course Include:
• Check how to adapt to network security in
automotive embedded systems
• The basics of automotive network security.
• Automotive network security, threats, threat
agents/vectors, vulnerability and risk assessment;
defense in depth, etc.
• Embedded system foundation
• Basic knowledge of automotive embedded system
product design cycle, project management,
production design, V&V and O&M.
The Main Points of This Course Include:
• Safety requirements for automotive embedded
systems
• Communication protocols, wired and wireless
networks, information and network attacks and
their impact on automotive embedded subsystems
and equipment
• Automotive risk assessment techniques and
methods, and use defensive tools to mitigate risks
and vulnerabilities
Course Outline:
• Cybersecurity Applied to Automotive
• Introduction to Embedded Systems and their
Applications in Automotive
• Automotive Cybersecurity Strategies
• Automotive Embedded System Vulnerability
Analysis
• Automotive Cybersecurity and Layers of Protection
• Cybersecurity Best Practices for Modern Vehicles
• Standards Development and Best Practices
• Securing Automotive Embedded Systems Interfaces
and Protocols
Course Outline:
• Cybersecurity Attacks and Best Mitigation Practices
for Automotive Embedded Systems
• Evaluating Cybersecurity Practices for Modern
Vehicles
• Case Study and Workshop (ISO/SAE 21434
Framework)
For More Information:
Automotive Cybersecurity Training
https://www.tonex.com/training-courses/
automotive-cybersecurity-training-course/

More Related Content

What's hot

Ppt citysurv as_a_service_en_slideshare
Ppt citysurv as_a_service_en_slidesharePpt citysurv as_a_service_en_slideshare
Ppt citysurv as_a_service_en_slideshareAxis Communications
 
Automotive Diagnostics Communication Protocols AnalysisKWP2000, CAN, and UDS
Automotive Diagnostics Communication Protocols AnalysisKWP2000, CAN, and UDSAutomotive Diagnostics Communication Protocols AnalysisKWP2000, CAN, and UDS
Automotive Diagnostics Communication Protocols AnalysisKWP2000, CAN, and UDSIOSR Journals
 
Telematics Engineering Syllabus 2017
Telematics Engineering Syllabus 2017Telematics Engineering Syllabus 2017
Telematics Engineering Syllabus 2017Ashwini Sudarshana
 
Ioterop @DigiWorldAwards2017
Ioterop @DigiWorldAwards2017Ioterop @DigiWorldAwards2017
Ioterop @DigiWorldAwards2017IDATE DigiWorld
 
IRJET- Intelligence Vehicle Monitoring System
IRJET- Intelligence Vehicle Monitoring SystemIRJET- Intelligence Vehicle Monitoring System
IRJET- Intelligence Vehicle Monitoring SystemIRJET Journal
 
End-to-End and e-Business Value from the Telematics Reference Implementation ...
End-to-End and e-Business Value from the Telematics Reference Implementation ...End-to-End and e-Business Value from the Telematics Reference Implementation ...
End-to-End and e-Business Value from the Telematics Reference Implementation ...mfrancis
 
5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCS5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCSMEN Micro
 
Zig bee based vehicle access control system
Zig bee based vehicle access control systemZig bee based vehicle access control system
Zig bee based vehicle access control systemRudra Pratap Singh
 
Advanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle CommunicationAdvanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle CommunicationIRJET Journal
 
What is Diagnostic over Internet Protocol (DoIP) and How it Supports Remote V...
What is Diagnostic over Internet Protocol (DoIP) and How it Supports Remote V...What is Diagnostic over Internet Protocol (DoIP) and How it Supports Remote V...
What is Diagnostic over Internet Protocol (DoIP) and How it Supports Remote V...Embitel Technologies (I) PVT LTD
 
Ppt safecities axis_ agentvi_jvp_en_1505
Ppt safecities axis_ agentvi_jvp_en_1505Ppt safecities axis_ agentvi_jvp_en_1505
Ppt safecities axis_ agentvi_jvp_en_1505Axis Communications
 
Shankar.V-CV
Shankar.V-CVShankar.V-CV
Shankar.V-CVshankar v
 
2015 Florida Automated Vehicles Initiative - FDOT - FTA
2015 Florida Automated Vehicles Initiative - FDOT - FTA2015 Florida Automated Vehicles Initiative - FDOT - FTA
2015 Florida Automated Vehicles Initiative - FDOT - FTAFlorida Trucking Association
 
01-AUTOSAR In-vehicle Standardization with Certainty of Operations towards Gl...
01-AUTOSAR In-vehicle Standardization with Certainty of Operations towards Gl...01-AUTOSAR In-vehicle Standardization with Certainty of Operations towards Gl...
01-AUTOSAR In-vehicle Standardization with Certainty of Operations towards Gl...Sivaram P
 
SEooC ISO 26262 | What is Safety Element Out of Context in Automotive Functio...
SEooC ISO 26262 | What is Safety Element Out of Context in Automotive Functio...SEooC ISO 26262 | What is Safety Element Out of Context in Automotive Functio...
SEooC ISO 26262 | What is Safety Element Out of Context in Automotive Functio...Embitel Technologies (I) PVT LTD
 
Asset Utilization Metrics Propel a Revival in Safety Solutions
Asset Utilization Metrics Propel a Revival in Safety SolutionsAsset Utilization Metrics Propel a Revival in Safety Solutions
Asset Utilization Metrics Propel a Revival in Safety SolutionsARC Advisory Group
 
Safe City Tekes Safety and Security programme 2013
Safe City Tekes Safety and Security programme 2013Safe City Tekes Safety and Security programme 2013
Safe City Tekes Safety and Security programme 2013Turvallisuus2013
 

What's hot (20)

Ppt citysurv as_a_service_en_slideshare
Ppt citysurv as_a_service_en_slidesharePpt citysurv as_a_service_en_slideshare
Ppt citysurv as_a_service_en_slideshare
 
Automotive Diagnostics Communication Protocols AnalysisKWP2000, CAN, and UDS
Automotive Diagnostics Communication Protocols AnalysisKWP2000, CAN, and UDSAutomotive Diagnostics Communication Protocols AnalysisKWP2000, CAN, and UDS
Automotive Diagnostics Communication Protocols AnalysisKWP2000, CAN, and UDS
 
ISO 26262: Automotive Functional Safety
ISO 26262: Automotive Functional SafetyISO 26262: Automotive Functional Safety
ISO 26262: Automotive Functional Safety
 
Telematics Engineering Syllabus 2017
Telematics Engineering Syllabus 2017Telematics Engineering Syllabus 2017
Telematics Engineering Syllabus 2017
 
Ioterop @DigiWorldAwards2017
Ioterop @DigiWorldAwards2017Ioterop @DigiWorldAwards2017
Ioterop @DigiWorldAwards2017
 
IRJET- Intelligence Vehicle Monitoring System
IRJET- Intelligence Vehicle Monitoring SystemIRJET- Intelligence Vehicle Monitoring System
IRJET- Intelligence Vehicle Monitoring System
 
End-to-End and e-Business Value from the Telematics Reference Implementation ...
End-to-End and e-Business Value from the Telematics Reference Implementation ...End-to-End and e-Business Value from the Telematics Reference Implementation ...
End-to-End and e-Business Value from the Telematics Reference Implementation ...
 
5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCS5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCS
 
Zig bee based vehicle access control system
Zig bee based vehicle access control systemZig bee based vehicle access control system
Zig bee based vehicle access control system
 
Advanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle CommunicationAdvanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle Communication
 
What is Diagnostic over Internet Protocol (DoIP) and How it Supports Remote V...
What is Diagnostic over Internet Protocol (DoIP) and How it Supports Remote V...What is Diagnostic over Internet Protocol (DoIP) and How it Supports Remote V...
What is Diagnostic over Internet Protocol (DoIP) and How it Supports Remote V...
 
Ppt safecities axis_ agentvi_jvp_en_1505
Ppt safecities axis_ agentvi_jvp_en_1505Ppt safecities axis_ agentvi_jvp_en_1505
Ppt safecities axis_ agentvi_jvp_en_1505
 
Shankar.V-CV
Shankar.V-CVShankar.V-CV
Shankar.V-CV
 
2015 Florida Automated Vehicles Initiative - FDOT - FTA
2015 Florida Automated Vehicles Initiative - FDOT - FTA2015 Florida Automated Vehicles Initiative - FDOT - FTA
2015 Florida Automated Vehicles Initiative - FDOT - FTA
 
UDS Protocol Stack | Manual Guide | Fact Sheet
UDS Protocol Stack | Manual Guide | Fact SheetUDS Protocol Stack | Manual Guide | Fact Sheet
UDS Protocol Stack | Manual Guide | Fact Sheet
 
01-AUTOSAR In-vehicle Standardization with Certainty of Operations towards Gl...
01-AUTOSAR In-vehicle Standardization with Certainty of Operations towards Gl...01-AUTOSAR In-vehicle Standardization with Certainty of Operations towards Gl...
01-AUTOSAR In-vehicle Standardization with Certainty of Operations towards Gl...
 
SEooC ISO 26262 | What is Safety Element Out of Context in Automotive Functio...
SEooC ISO 26262 | What is Safety Element Out of Context in Automotive Functio...SEooC ISO 26262 | What is Safety Element Out of Context in Automotive Functio...
SEooC ISO 26262 | What is Safety Element Out of Context in Automotive Functio...
 
Asset Utilization Metrics Propel a Revival in Safety Solutions
Asset Utilization Metrics Propel a Revival in Safety SolutionsAsset Utilization Metrics Propel a Revival in Safety Solutions
Asset Utilization Metrics Propel a Revival in Safety Solutions
 
Embedded system seminar
Embedded system seminarEmbedded system seminar
Embedded system seminar
 
Safe City Tekes Safety and Security programme 2013
Safe City Tekes Safety and Security programme 2013Safe City Tekes Safety and Security programme 2013
Safe City Tekes Safety and Security programme 2013
 

Similar to Automotive Cybersecurity Embedded Systems Training

Autonomous Car Cyber Threats and Digital Forensics Training - Tonex Training
Autonomous Car Cyber Threats and Digital Forensics Training - Tonex TrainingAutonomous Car Cyber Threats and Digital Forensics Training - Tonex Training
Autonomous Car Cyber Threats and Digital Forensics Training - Tonex TrainingBryan Len
 
Cyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdfCyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdfDorleControls
 
Hacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWHacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWKapil Kanugo
 
FASTR_Overview2017
FASTR_Overview2017FASTR_Overview2017
FASTR_Overview2017Craig Hurst
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldBrad Nicholas
 
Are we going to have security issues on connected cars?
Are we going to have security issues on connected cars?Are we going to have security issues on connected cars?
Are we going to have security issues on connected cars?PECB
 
WHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into CarsWHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into CarsSymantec
 
ConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WPConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WPGreg Harms
 
Vehicle Diagnostics and Communication.pdf
Vehicle Diagnostics and Communication.pdfVehicle Diagnostics and Communication.pdf
Vehicle Diagnostics and Communication.pdfDorleControls
 
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...IJCI JOURNAL
 
Car Cybersecurity: What do Automakers Really Think?
Car Cybersecurity: What do Automakers Really Think?Car Cybersecurity: What do Automakers Really Think?
Car Cybersecurity: What do Automakers Really Think?Security Innovation
 
Cybersecurity in Automotive Connected Vehicles and Growing Security Vulnerabi...
Cybersecurity in Automotive Connected Vehicles and Growing Security Vulnerabi...Cybersecurity in Automotive Connected Vehicles and Growing Security Vulnerabi...
Cybersecurity in Automotive Connected Vehicles and Growing Security Vulnerabi...BIS Research Inc.
 
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)ParthaS
 
Software defined vehicles,automotive standards (safety, security), agile cont...
Software defined vehicles,automotive standards (safety, security), agile cont...Software defined vehicles,automotive standards (safety, security), agile cont...
Software defined vehicles,automotive standards (safety, security), agile cont...Dr. Anish Cheriyan (PhD)
 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd Iaetsd
 
End-to-End Architectural Considerations for Supporting Telematics Solutions -...
End-to-End Architectural Considerations for Supporting Telematics Solutions -...End-to-End Architectural Considerations for Supporting Telematics Solutions -...
End-to-End Architectural Considerations for Supporting Telematics Solutions -...mfrancis
 

Similar to Automotive Cybersecurity Embedded Systems Training (20)

Autonomous Car Cyber Threats and Digital Forensics Training - Tonex Training
Autonomous Car Cyber Threats and Digital Forensics Training - Tonex TrainingAutonomous Car Cyber Threats and Digital Forensics Training - Tonex Training
Autonomous Car Cyber Threats and Digital Forensics Training - Tonex Training
 
Cyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdfCyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdf
 
Hacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWHacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOW
 
FASTR_Overview2017
FASTR_Overview2017FASTR_Overview2017
FASTR_Overview2017
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
 
Are we going to have security issues on connected cars?
Are we going to have security issues on connected cars?Are we going to have security issues on connected cars?
Are we going to have security issues on connected cars?
 
WHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into CarsWHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into Cars
 
ConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WPConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WP
 
Vehicle Diagnostics and Communication.pdf
Vehicle Diagnostics and Communication.pdfVehicle Diagnostics and Communication.pdf
Vehicle Diagnostics and Communication.pdf
 
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
 
Car Cybersecurity: What do Automakers Really Think?
Car Cybersecurity: What do Automakers Really Think?Car Cybersecurity: What do Automakers Really Think?
Car Cybersecurity: What do Automakers Really Think?
 
Car cybersecurity: What do automakers really think?
Car cybersecurity: What do automakers really think?Car cybersecurity: What do automakers really think?
Car cybersecurity: What do automakers really think?
 
Cybersecurity in Automotive Connected Vehicles and Growing Security Vulnerabi...
Cybersecurity in Automotive Connected Vehicles and Growing Security Vulnerabi...Cybersecurity in Automotive Connected Vehicles and Growing Security Vulnerabi...
Cybersecurity in Automotive Connected Vehicles and Growing Security Vulnerabi...
 
Automotive Cyber Security.pdf
Automotive Cyber Security.pdfAutomotive Cyber Security.pdf
Automotive Cyber Security.pdf
 
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
 
Automotive Cybersecurity: The Gap Still Exists
Automotive Cybersecurity: The Gap Still ExistsAutomotive Cybersecurity: The Gap Still Exists
Automotive Cybersecurity: The Gap Still Exists
 
Software defined vehicles,automotive standards (safety, security), agile cont...
Software defined vehicles,automotive standards (safety, security), agile cont...Software defined vehicles,automotive standards (safety, security), agile cont...
Software defined vehicles,automotive standards (safety, security), agile cont...
 
Automotive
AutomotiveAutomotive
Automotive
 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systems
 
End-to-End Architectural Considerations for Supporting Telematics Solutions -...
End-to-End Architectural Considerations for Supporting Telematics Solutions -...End-to-End Architectural Considerations for Supporting Telematics Solutions -...
End-to-End Architectural Considerations for Supporting Telematics Solutions -...
 

More from Tonex

5G AI & Digital Twins Training Course
5G AI & Digital Twins Training Course5G AI & Digital Twins Training Course
5G AI & Digital Twins Training CourseTonex
 
MBSE for Dod, Digital Engineering Training
MBSE for Dod, Digital Engineering TrainingMBSE for Dod, Digital Engineering Training
MBSE for Dod, Digital Engineering TrainingTonex
 
Engineering Project Management Training, Learn the PMI keys, Project manageme...
Engineering Project Management Training, Learn the PMI keys, Project manageme...Engineering Project Management Training, Learn the PMI keys, Project manageme...
Engineering Project Management Training, Learn the PMI keys, Project manageme...Tonex
 
Revenue Assurance (RA), Telecom RA Training Course
Revenue Assurance (RA), Telecom RA Training CourseRevenue Assurance (RA), Telecom RA Training Course
Revenue Assurance (RA), Telecom RA Training CourseTonex
 
5G Systems Engineering Training
5G Systems Engineering Training5G Systems Engineering Training
5G Systems Engineering TrainingTonex
 
Root Cause Analysis Training
Root Cause Analysis TrainingRoot Cause Analysis Training
Root Cause Analysis TrainingTonex
 
Learning PFMEA, Process Failure Mode Effects Analysis, PFMEA Advantages, Tools
Learning PFMEA, Process Failure Mode Effects Analysis, PFMEA Advantages, ToolsLearning PFMEA, Process Failure Mode Effects Analysis, PFMEA Advantages, Tools
Learning PFMEA, Process Failure Mode Effects Analysis, PFMEA Advantages, ToolsTonex
 
Proposal Engineering Hands-On Workshop, Architecture, Construction and Engine...
Proposal Engineering Hands-On Workshop, Architecture, Construction and Engine...Proposal Engineering Hands-On Workshop, Architecture, Construction and Engine...
Proposal Engineering Hands-On Workshop, Architecture, Construction and Engine...Tonex
 
Cybersecurity Hands-On Training
Cybersecurity Hands-On TrainingCybersecurity Hands-On Training
Cybersecurity Hands-On TrainingTonex
 
Bluetooth Low Energy BLE, Hands-On Training
Bluetooth Low Energy BLE, Hands-On TrainingBluetooth Low Energy BLE, Hands-On Training
Bluetooth Low Energy BLE, Hands-On TrainingTonex
 
Learn how manufacturers use root cause analysis, rca training for manufacturers
Learn how manufacturers use root cause analysis, rca training for manufacturersLearn how manufacturers use root cause analysis, rca training for manufacturers
Learn how manufacturers use root cause analysis, rca training for manufacturersTonex
 
Spacecraft MBSE-SysML, Hands-On Training
Spacecraft MBSE-SysML, Hands-On TrainingSpacecraft MBSE-SysML, Hands-On Training
Spacecraft MBSE-SysML, Hands-On TrainingTonex
 
CBRS
CBRSCBRS
CBRSTonex
 
C Programming and Coding Standards, Learn C Programming
C Programming and Coding Standards, Learn C ProgrammingC Programming and Coding Standards, Learn C Programming
C Programming and Coding Standards, Learn C ProgrammingTonex
 
Tonex "Software Engineering Training" Top 5 Courses For Cybersecurity Profess...
Tonex "Software Engineering Training" Top 5 Courses For Cybersecurity Profess...Tonex "Software Engineering Training" Top 5 Courses For Cybersecurity Profess...
Tonex "Software Engineering Training" Top 5 Courses For Cybersecurity Profess...Tonex
 
Cyber Security Certificate Training
Cyber Security Certificate TrainingCyber Security Certificate Training
Cyber Security Certificate TrainingTonex
 
Electronic Warfare Threat Modeling and Simulation Training
Electronic Warfare Threat Modeling and Simulation TrainingElectronic Warfare Threat Modeling and Simulation Training
Electronic Warfare Threat Modeling and Simulation TrainingTonex
 
Join Business Writing Skills Training and Write clear
Join Business Writing Skills Training and Write clearJoin Business Writing Skills Training and Write clear
Join Business Writing Skills Training and Write clearTonex
 
Conflict Management Training, Learn The Causes Of Conflict
Conflict Management Training, Learn The Causes Of ConflictConflict Management Training, Learn The Causes Of Conflict
Conflict Management Training, Learn The Causes Of ConflictTonex
 
Big Data for Project and Program Managers
Big Data for Project and Program ManagersBig Data for Project and Program Managers
Big Data for Project and Program ManagersTonex
 

More from Tonex (20)

5G AI & Digital Twins Training Course
5G AI & Digital Twins Training Course5G AI & Digital Twins Training Course
5G AI & Digital Twins Training Course
 
MBSE for Dod, Digital Engineering Training
MBSE for Dod, Digital Engineering TrainingMBSE for Dod, Digital Engineering Training
MBSE for Dod, Digital Engineering Training
 
Engineering Project Management Training, Learn the PMI keys, Project manageme...
Engineering Project Management Training, Learn the PMI keys, Project manageme...Engineering Project Management Training, Learn the PMI keys, Project manageme...
Engineering Project Management Training, Learn the PMI keys, Project manageme...
 
Revenue Assurance (RA), Telecom RA Training Course
Revenue Assurance (RA), Telecom RA Training CourseRevenue Assurance (RA), Telecom RA Training Course
Revenue Assurance (RA), Telecom RA Training Course
 
5G Systems Engineering Training
5G Systems Engineering Training5G Systems Engineering Training
5G Systems Engineering Training
 
Root Cause Analysis Training
Root Cause Analysis TrainingRoot Cause Analysis Training
Root Cause Analysis Training
 
Learning PFMEA, Process Failure Mode Effects Analysis, PFMEA Advantages, Tools
Learning PFMEA, Process Failure Mode Effects Analysis, PFMEA Advantages, ToolsLearning PFMEA, Process Failure Mode Effects Analysis, PFMEA Advantages, Tools
Learning PFMEA, Process Failure Mode Effects Analysis, PFMEA Advantages, Tools
 
Proposal Engineering Hands-On Workshop, Architecture, Construction and Engine...
Proposal Engineering Hands-On Workshop, Architecture, Construction and Engine...Proposal Engineering Hands-On Workshop, Architecture, Construction and Engine...
Proposal Engineering Hands-On Workshop, Architecture, Construction and Engine...
 
Cybersecurity Hands-On Training
Cybersecurity Hands-On TrainingCybersecurity Hands-On Training
Cybersecurity Hands-On Training
 
Bluetooth Low Energy BLE, Hands-On Training
Bluetooth Low Energy BLE, Hands-On TrainingBluetooth Low Energy BLE, Hands-On Training
Bluetooth Low Energy BLE, Hands-On Training
 
Learn how manufacturers use root cause analysis, rca training for manufacturers
Learn how manufacturers use root cause analysis, rca training for manufacturersLearn how manufacturers use root cause analysis, rca training for manufacturers
Learn how manufacturers use root cause analysis, rca training for manufacturers
 
Spacecraft MBSE-SysML, Hands-On Training
Spacecraft MBSE-SysML, Hands-On TrainingSpacecraft MBSE-SysML, Hands-On Training
Spacecraft MBSE-SysML, Hands-On Training
 
CBRS
CBRSCBRS
CBRS
 
C Programming and Coding Standards, Learn C Programming
C Programming and Coding Standards, Learn C ProgrammingC Programming and Coding Standards, Learn C Programming
C Programming and Coding Standards, Learn C Programming
 
Tonex "Software Engineering Training" Top 5 Courses For Cybersecurity Profess...
Tonex "Software Engineering Training" Top 5 Courses For Cybersecurity Profess...Tonex "Software Engineering Training" Top 5 Courses For Cybersecurity Profess...
Tonex "Software Engineering Training" Top 5 Courses For Cybersecurity Profess...
 
Cyber Security Certificate Training
Cyber Security Certificate TrainingCyber Security Certificate Training
Cyber Security Certificate Training
 
Electronic Warfare Threat Modeling and Simulation Training
Electronic Warfare Threat Modeling and Simulation TrainingElectronic Warfare Threat Modeling and Simulation Training
Electronic Warfare Threat Modeling and Simulation Training
 
Join Business Writing Skills Training and Write clear
Join Business Writing Skills Training and Write clearJoin Business Writing Skills Training and Write clear
Join Business Writing Skills Training and Write clear
 
Conflict Management Training, Learn The Causes Of Conflict
Conflict Management Training, Learn The Causes Of ConflictConflict Management Training, Learn The Causes Of Conflict
Conflict Management Training, Learn The Causes Of Conflict
 
Big Data for Project and Program Managers
Big Data for Project and Program ManagersBig Data for Project and Program Managers
Big Data for Project and Program Managers
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Automotive Cybersecurity Embedded Systems Training

  • 1.
  • 2. In the past decade, the automotive industry has undergone tremendous technological changes in terms of connectivity and personal mobility. Modern cars are more and more like computers rather than mechanical products. It is not uncommon for modern cars to have remote connectivity and high-tech features, such as touch-sensitive dashboards, which can keep themselves up to date through regular software updates.
  • 3. The risk of a cyber attack will depend on the potential outcome and the factors that determine the likelihood of the attack. In the automotive industry, the consequences can be severe-if safety-related functions are compromised, it can cause injury or death, and if a large number of vehicles are threatened or required to be recalled, it can cause serious damage to reputation.
  • 4. In the new digital age, due to the vehicle’s wireless communication capabilities, mobile devices (such as cellular phones or tablets connected to the vehicle via USB, Bluetooth or Wi-Fi) may have vulnerabilities inside or inside, and this problem is becoming more and more disturbing Third-party equipment connected through the vehicle diagnostic port.
  • 5. As the digital transformation of the automotive industry exposes new cybersecurity threats, this is a serious problem. Before the digital age and the advent of 5G architecture, what happened in your car usually stayed in your car. Of course this is no longer the case. The influx of digital innovation from infotainment connections to over-the-air (OTA) software updates is turning cars into clearing houses.
  • 6. In cooperation with the National Institute of Standards and Technology Cybersecurity Framework, the automotive industry has been actively responding to automotive cybersecurity challenges and continuously exploring ways to mitigate related risks. Therefore, regulators and governments have worked hard to ensure that network security has become an indispensable focus at all levels of the automotive supply chain.
  • 7. Adding security components to automotive embedded systems may hinder the function of the system and affect the real-time performance of mission-critical systems. Automotive system and software engineers, testers, hardware designers, developers, and security analysts need a well-defined method to simultaneously design automotive embedded functions and network security.
  • 8. Secure automotive embedded systems may use security coprocessors to cryptographically ensure the confidentiality and integrity of the system while maintaining functionality.
  • 9. Tonex's Automotive Cybersecurity Training Automotive Cyber ​​Security Training (Network Security for Automotive Embedded Systems) is a 3-day course. Participants will discuss the basic principles of embedded systems and the application of cyber security in vehicles to illustrate unique vulnerabilities that are commonly exploited.
  • 10. Learn about: • Protection of automotive electronic systems • Embedded systems • Communication networks • Controller Area Network (CAN bus) • Ethernet • Control algorithms • Software • Threat agents • Vulnerabilities • Underlying data from malicious attacks, damage, unauthorized access, or manipulation.
  • 11. Participants will study methods and technologies related to the entire automotive system life cycle and cyber security measures during the purchase process. Security embedded systems in automotive applications include many programs, methods and technologies that can seamlessly integrate network security into automotive embedded system software. Participants will discover automotive network protection that applies to all or any automotive data, applications and systems.
  • 12. Who Should Attend: • Chief Product Security Officers (CPSO) • Control Platform • Developers working with embedded systems • Embedded software engineers and testers • Ethernet and CAN Bus Software Engineers and Testers, Hardware Testers • Functional Safety Electrical Engineering • Information security professionals • Machine Learning Platform Engineers and Managers • Mechatronics Engineer, Sensor Cleaning Engineers and PMs
  • 13. Who Should Attend: • Application developers • Automotive Engineering Manager • Automotive Product & Infrastructure • Automotive Verification and Validation Engineers and Managers • Autonomous Vehicle Development Software and Hardware Engineers • Chief Security Officers (CSO) • Chief Information Security Officers (CISO) • Chief Information Officers and IT Security directors
  • 14. Who Should Attend: • Product & Infrastructure Engineers and PMs • Product/process designers and engineers • Reliability Engineers • Reliability, Safety, Quality Assurance and Security Engineers • Software Engineer – FPGA Design • Software Engineer Robotics – Controls • System, Software and Hardware Test, Evaluation and Debug Engineers • Security Operations Center (SOC) Managers and Team Leaders
  • 15. The Main Points of This Course Include: • Hardware and firmware analysis and design basis in automotive embedded design • Vulnerabilities in automotive embedded systems • Embedded hardware and firmware analysis to detect vulnerabilities • Master the basic knowledge of automotive cyber security threats, risks and mitigation strategies applicable to embedded systems • Exploitable vulnerabilities in automotive embedded systems and technologies and strategies for systems engineering embedded systems
  • 16. The Main Points of This Course Include: • Check how to adapt to network security in automotive embedded systems • The basics of automotive network security. • Automotive network security, threats, threat agents/vectors, vulnerability and risk assessment; defense in depth, etc. • Embedded system foundation • Basic knowledge of automotive embedded system product design cycle, project management, production design, V&V and O&M.
  • 17. The Main Points of This Course Include: • Safety requirements for automotive embedded systems • Communication protocols, wired and wireless networks, information and network attacks and their impact on automotive embedded subsystems and equipment • Automotive risk assessment techniques and methods, and use defensive tools to mitigate risks and vulnerabilities
  • 18. Course Outline: • Cybersecurity Applied to Automotive • Introduction to Embedded Systems and their Applications in Automotive • Automotive Cybersecurity Strategies • Automotive Embedded System Vulnerability Analysis • Automotive Cybersecurity and Layers of Protection • Cybersecurity Best Practices for Modern Vehicles • Standards Development and Best Practices • Securing Automotive Embedded Systems Interfaces and Protocols
  • 19. Course Outline: • Cybersecurity Attacks and Best Mitigation Practices for Automotive Embedded Systems • Evaluating Cybersecurity Practices for Modern Vehicles • Case Study and Workshop (ISO/SAE 21434 Framework)
  • 20. For More Information: Automotive Cybersecurity Training https://www.tonex.com/training-courses/ automotive-cybersecurity-training-course/