Cybersecurity and Embedded Systems

Course Description

Embedded systems offer many opportunities to economically and effectively control large infrastructure systems, small single purpose devices and many products in between. But their use can also introduce vulnerabilities easily exploited to gain access to valuable data, alter device functionality or impose other risks. Understand those unique vulnerabilities in embedded systems that are commonly exploited. Discover techniques and strategies for designing cyber security measures into products from the start. Through hands-on labs, examine emerging threats and learn to think like a “hacker” to gain the skills necessary to create more secure products. Focus on methodologies for assessing risk, integrating defensive tools for mitigating risk and addressing future vulnerabilities throughout the product life cycle. Discover best practices to integrate into your design processes to raise your level of product security.

Course ID: DEF 4604P
Course Format: Classroom

Contract Only Course

This course is available for contract only. Please fill out this form if you are interested in this offering.

Special Discounts

Georgia Tech Research Institute (GTRI) employees are eligible to receive a discount.  If you are a GTRI employee, please go to the Organizational Development website and look for the coupon code under GT Professional Development. Review coupon instructions for more information.

Who Should Attend

Product/process designers and engineers using embedded systems, information security professionals and application developers

How You Will Benefit

  • Develop foundational knowledge of cyber security threats and strategies for mitigating risk.
  • View your products from the perspective of the “hacker,” identifying exploitations and exploring how tools are used to gain entry into seemingly secure environments.
  • Examine wired and wireless networks, network attacks and their impact on devices.
  • Develop skills for analyzing and addressing vulnerabilities in products with embedded systems.
  • Analyze embedded hardware and firmware to detect vulnerabilities and opportunities for improving security.
  • Identify and apply best practices, skills and techniques for integrating security into the design process from the start.


  • Foundations of cyber security and emerging threats

  • Hacking/exploitation techniques, tools and entry points

  • Defensive technologies: Encryption and authentication

  • Vulnerability analysis methodology

  • Networking and network attacks

  • Wireless networks and embedded systems

  • Embedded hardware and firmware analysis

  • Secure software practices

  • Integrating security into the design process

  • Case studies and hands-on labs



  • Laptop PC with CD-ROM drive


  • Notes and presentation materials