Courses

Cybersecurity issues are getting more relevance, because it affects all companies and sectors. This is why the cybersecurity  learning lab is offering a wide range of seminars for several industries and special topics like Security in Embedded Systems, IT-security in the automotive field or hacking.

 

If you are intrested what the cybersecurity lab is offering besides, subscribe our newsletter (German).  

Embedded Security Engineering

To implement suitable IT security measures many different factors must be taken into account. The participants will become familiarized with a development process for embedded systems, both theoretically and practically, based on a specific application case. Hot topics, such as post-quantum cryptography and its practical feasibility in embedded systems, will also be considered.

 

Target group: developers in the field of automotive security, IoT and Embedded systems; IT security experts

Duration: 2 days in class

Requirements: Good understanding of technical systems, ideally in the field of embedded systems

Hacking: Binary Exploitation

More and more devices and systems can now be reached through the Internet and other networks, exposing them to direct attacks. This creates challenges for many companies to appropriately secure their systems and protect themselves against possible hacker attacks.The main focus of this seminar is the field of binary exploitation: for example, how programming errors in C code can be exploited to inject and execute external code.

 

Target group: group Developers, testers, operators and users

Duration: 3 days in class

Requirements: Linux basics: Routine operations with the Bourne-Again Shell (BASH) and the GNU Debugger (GDB)

Programming knowledge: Fluent reading and understanding of code in C, programming experience in C or Python

Assembler: Reading and understanding of x86_64 assembler, programming in assembler is not required

IT Security Analysis and Tests for Embedded Systems

New interfaces and networked interconnections (e.g. IoT products or smart meters) make IT security an important quality feature of embedded systems. Unlike classic safety tests, security problems here are unexpected and hard to foresee. Participants will learn how to efficiently track various types of security problems on both conceptual and implementation levels.

Target group: developers in the field of embedded systems, Security experts, who carry out practical tests on embedded system

Duration: 2 days in class

Requirements: Good understanding of technical systems, ideally in the field of embedded systems, Basic knowledge of electronics, IT security, cryptography and programming in C and Python

IT Security in Vehicle Communication

New functions in vehicles are increasingly created through networked connections of control devices both interconnected between devices and with other external communication partners. The workshop first covers the basic cryptographic mechanisms, presenting and discussing them, providing an introduction to the field of IT security in vehicle communication.

 

Target group: Employees of vehicle manufacturers and suppliers who do not have a deeper understanding of IT security

Duration: 2 days ONLINE

Requirements: Basic knowledge of vehicle IT

Practical Automotive Security Testing

The challenge: Testing the cyber-security of electronic control devices comprehensively and efficiently! In this seminar, you will learn how to efficiently track various types of security problems at conceptual and implementation levels. Up-to-date, field-tested research methods and procedures for analyzing ve-hicle electronics are clearly demonstrated in hands-on training.

 

Target group: Developers in the automotive industry, Security experts , who carry out practical tests on vehicle electronics

Duration: 1.5 days in class

Requirements: Good understanding of technical systems, ideally, in the field of vehicle electronics or embedded systems

Secure Software Engineering in the Automotive Development Process

Systems and applications are becoming more and more complex, and more interconnected. This expands the areas in which the systems are susceptible to attacks. The goal of this basic training course is to provide participants with the knowledge and the ability to assess current procedure models, methods and tools that can be used for the systematic development of secure software throughout its entire life cycle.

Target group: Software architects and engineers, experts and technical (project) managers in development projects

Duration: 2 days in class

Requirements: Basic knowledge of software engineering: software development processes, requirement analysis, programming in Java or C, software testing