Linux is increasingly popular for connected embedded devices.
Choose a 3, 4 or 5-day course to include all the technical detail your team needs to harden the OS and your applications against malicious or accidental security breaches, topics include:
Trainees take away comprehensive notes and a Linux VirtualBox VM containing all the practical exercises.
During the course, trainees work through the challenges on our 'capture the flag' vulnerable Linux server.
Thinking like an attacker helps you to understand how to better protect your system.
Still the language of choice for most embedded systems, C is notorious for introducing accidental security holes.
This 2 or 3-day course teaches you to design, code and test C applications with security in mind, going beyond normal coding best practice, you'll understand and protect against:
This one-day course can help you to integrate security best practice into all stages of your development lifecycle, with:
All our courses can be adapted to include workshops that tackle your specific security concerns (under your NDA).
In these expert-led sessions, your engineers and managers get a head start in turning theory into practice while it's still fresh in their minds.