Embedded systems offer many opportunities to economically and effectively control large infrastructure systems, small single purpose devices and many products in between. But their use can also introduce vulnerabilities easily exploited to gain access to valuable data, alter device functionality or impose other risks. Understand those unique vulnerabilities in embedded systems that are commonly exploited. Discover techniques and strategies for designing cyber security measures into products from the start. Through hands-on labs, examine emerging threats and learn to think like a “hacker” to gain the skills necessary to create more secure products. Focus on methodologies for assessing risk, integrating defensive tools for mitigating risk and addressing future vulnerabilities throughout the product life cycle. Discover best practices to integrate into your design processes to raise your level of product security.
This course is available for contract only. Please fill out this form if you are interested in this offering.
Georgia Tech Research Institute (GTRI) employees are eligible to receive a discount. If you are a GTRI employee, please go to the Organizational Development website and look for the coupon code under GT Professional Development. Review coupon instructions for more information.
Who Should Attend
Product/process designers and engineers using embedded systems, information security professionals and application developers
How You Will Benefit
Develop foundational knowledge of cyber security threats and strategies for mitigating risk.
View your products from the perspective of the “hacker,” identifying exploitations and exploring how tools are used to gain entry into seemingly secure environments.
Examine wired and wireless networks, network attacks and their impact on devices.
Develop skills for analyzing and addressing vulnerabilities in products with embedded systems.
Analyze embedded hardware and firmware to detect vulnerabilities and opportunities for improving security.
Identify and apply best practices, skills and techniques for integrating security into the design process from the start.
Foundations of cyber security and emerging threats
Hacking/exploitation techniques, tools and entry points
Defensive technologies: Encryption and authentication
Partner with Georgia Tech to hire a veteran. As a partner, the Georgia Tech program will train military members in areas that directly translate to their job duties.
Georgia Tech Professional Education allows working professionals and industry partners to access the expertise of a world-renowned technological research university. As an academic division of the Georgia Institute of Technology, we embrace the Georgia Tech values of integrity, excellence, impact, and innovation. These values drive every aspect of our programs.