SEC.331 Secure Embedded & (I)IoT-Products Secure Embedded & (I)IoT-Products

 2.350,00

To implement security correctly in a product, a holistic approach is crucial. In this training, the necessary building blocks for a secure solution are discussed and possibilities & limitations are shown. From regulatory requirements and threat modelling to various technologies that may be relevant for implementation (virtualization, secure boot, secure storage, …) to secure development practices and test tools, the „Secure Embedded & (I)IoT Products“ training course teaches participants how security can be implemented and verified in products so that products are sufficiently secured for their operating environment.

Description

Duration

3 days

Costs/participants
€ 2.350,- zzgl. VAT
Minimum number of participants
8 persons
Prerequisite

No prior knowledge necessary

What you can expect from
SEC.331 Secure Embedded & (I)IoT-Products

Targeted development of expertise for secure (I)IoT products

You will learn how to avoid vulnerabilities early on—through solid security knowledge and clear “dos and don’ts” for development and project work.

Practical learning with real attack scenarios

Our experienced trainers demonstrate how attackers operate—and which protective measures really work in practice. Theory and hands-on exercises are seamlessly integrated.

Customizable for your product range

The training can be tailored to your technologies, challenges, and issues—for maximum benefit in your business context.

You are on the search for an individual In-house training for your team?

Take your OT security know-how to the next level.

What you will learn during this training course

Day 1 (Requirements)

Regulations and standards

  • Regulations (NIS, CRA, RED, MR)
  • IEC 62443

Security fundamentals

  • Security management
  • Roles, responsibilities and expertise
  • Integrity protection (code signing)
  • Supplier management (SBOM)
  • Vulnerability monitoring (CVSS, CVE)

Threat Modeling

  • Safety vs. security
  • Threat modeling methodology

Day 2 (Design)

Secure by design

  • Best practices
  • Defense in depth, least privilege, least functionality, secure patterns, secure by default,…
  • System hardening (Linux, Windows, RTOS …)

Security technologies

  • Security components (TPM, Secure Element, SOC Features)
  • Chain of trust (secure boot)
  • Secure storage
  • Secure interfaces and update
  • Virtualization
  • Audit/Logging
  • Secure communication and protocols

Day 3 (Implementation & Verification)

Secure implementation

  • Coding standards
  • Reviews

Hardware security

Security testing

  • Fuzzing
  • Code analysis tools
  • Binary analysis

After the training, participants will:

  • Understand the need for “secure product development”
  • understand and comprehend the basics of security (e.g. cryptography, secure design practices)
  • know and be able to select relevant security components/modules for the system architecture (TPM, Secure Boot, Secure Storage,…)
  • Know test tools and be able to use them in the development process

What others say

Varied training and clearly presented. Pleasant atmosphere and helpful documents.

Awareness & Compliance Training

Relaxed atmosphere in the seminar and high competence of the trainers. Participants were well involved, which led to active discussions. The hands-on exercises worked smoothly and were well described. I will recommend Limes to others.

OT-Security Training

Topic was mega interesting and very informative. The presentation, overview, outline, lecture and speaker were very good and gave me a lot of insight into the topic. Clear delimitation of the topics and not focused on everything.

Product Security Training

Great presentation and speaker who conveyed the topic in a way that was easy to understand. The connection between MR/NIS2/CRA/IEC62443 is now clear to me. For me the walk through of IEC62443 was helpful so I don't have to read it myself but know which bullet points to look at. Good time management.

Product Security Training

The practical part included helpful case studies. Pleasant lecture style, good for following and listening as well as collaborating.

Awareness & Compliance Training

Sympathetic trainers who were helpful with questions, explained a lot using practical examples and gave pleasant explanations.

OT-Security Training

Overview of security requirements according to IEC 62443 was informative and the list of tools to find vulnerabilities in products with Ethernet interfaces was helpful. Good presentation of the topics and many questions were answered quickly.

Product Security Training

More than just training: your journey to secure product development starts here.

Find out how Limes Security can support you not only with training, but also with customized consulting, workshops and standards-compliant support for the secure development of your products.

Get to know our
trainers

You may also like…

  • vorschaubild zum Limes Academy Awareness Training SEC311
    Select options This product has multiple variants. The options may be chosen on the product page Quick View

    SEC.311 Secure Development Process for OT and (I)IoT

     2.025,00
  • vorschaubild zum Limes Academy Awareness Training SEC312
    Select options This product has multiple variants. The options may be chosen on the product page Quick View

    SEC.312 Cyber Resilience Act (CRA) for manufacturers of machinery and equipment

     940,00
Share