Webinar: Warning!! your Embedded System is Under Attack

To understand how to choose the right device with the right security features requires knowledge of the security infrastructure provided by the vendor and how to configure the complex puzzle to achieve the required security level. We will describe the main security building blocks and their role
Write your awesome label here.
Webinar series

Course Agenda

Topics of Discussion
  • Embedded Systems security challenges 
  • Embedded systems attack type --
  • Attacker's arsenal state of the art tools --
  • Local and remote attacks on Embedded Systems
  • Properties of secure Embedded systems