Automotive Cyber Security

Training by best Industry Experts | Certification

Enroll and Pay Now
Limited no. of seats available

Training Overview of Topics

From introductions for people new to the topic to briefing sessions for decision-makers, our automotive cybersecurity courses go over and beyond technical questions to look at all relevant topics. One big message that we convey is that comprehensive protection is a challenge to entire companies. This is because operational and organizational structures can be an open invitation to intruders to invade your electronic systems. As well as looking at established standards and guidelines, we also consider the future of the ISO/SAE 21434 standard and show how to methodically and systematically shield your automotive electronic systems from cyberattacks.

All courses are also available as in-house staff training courses, which we can tailor to your requirements and hold at your place of work.

Overview

Systems that are connected to other systems are vulnerable to cyberattacks. This is just as applicable to automotive electronics as it is to IT systems connected to digital services. This is where our training courses come in. We offer you a fundamental introduction to cyber-security and information security, from analyzing threats and risks to defensive strategies. Each training session concentrates on different methods, standards, and guidelines, providing you with a comprehensive overview of the topics covered by automotive security.

What you will learn?

Introduction to Car Security

  • Modern Vehicle as "Data Center on Wheels"
  • Vehicle Architecture Overview
  • Historical Automotive Hacks
  • Industry Impact
  • Defense in Depth Across Security Domains
  • Cyber Threat Sources Evolution
  • Modern Car Electronics Architecture
  • Connected & Autonomous Vehicles
  • Attack Surfaces & Threat Vectors
  • Security Requirements (CIA+)
  • Authentication vs Authorization vs Encryption
  • Defense in Depth (Onion Model)
  • Cryptographic Key Lengths
  • Security Operations & Threat Intelligence
  • Enterprise Security Priorities

Embedded Security & Cryptography Basics

  • IT Security vs. Automotive Security
  • Security Objectives (6 Pillars)
  • Symmetric Key Cryptography
  • Asymmetric Key Cryptography Introduction
  • CAN Bus Security Challenges

CAN Bus Attack Scenarios (Hoppe Research)

  • CERT Taxonomy for Incident Classification
  • Attack Scenario S1: Electric Window Lift
  • Attack Scenario S2: Warning Lights Manipulation
  • Attack Scenario S3: Airbag Control System
  • Attack Scenario S4: Gateway ECU Exploitation
  • Security Aspects Analysis
  • Short-term Countermeasures
  • Intrusion Detection Systems (IDS)
  • Long-term Solutions
  • Safety vs. Security Interplay

Computer Security Fundamentals

  • Security Philosophy
  • Famous Security Incidents
  • Buffer Overflow Attacks
  • Integer Overflow Attacks
  • Format String Vulnerabilities
  • Heap Exploitation
  • Access Control Models
  • Virtualization for Security
  • Browser Security

Kali Linux for Penetration Testing

  • Linux File System Structure
  • Essential Terminal Commands
  • User and Permission Management
  • Terminal Multiplexers
  • File Manipulation
  • File Compression
  • Text File Management
  • Remote Connections
  • Service Management
  • Advanced Text Processing
  • Package Management
  • Process Management
  • System Information

Kali Linux - Practical Lab & QNX/Android Hacking

  • Hands-on Lab Session
  • QNX Operating System (Video Analysis)
  • Android Infotainment Hacking
  • Privilege Escalation Concepts

Guest Lecture: Cryptography Deep Dive

  • Inrtoduction to Cryptography
  • Recommended Key Lengths
  • Hash Functions
  • Message Authentication Codes (MAC)
  • Non-repudiation Concepts

QNX/Android Hacking & Vehicle Security Architecture

  • QNX Hacking (Video: Nico Rivera - DEF CON 27)
  • QNX Enumeration & Attack Vectors
  • Android Infotainment Hacking
  • ADB (Android Debug Bridge) Exploitation
  • Android Privilege Escalation
  • Hardware Hacking Techniques
  • Flash Chip Reflashing (Russian Forum Technique)
  • Linux File Permissions & Security
  • Vehicle Physical Security
  • Security Modules
  • Vehicle Security Architecture Types

Vehicular Security Mechanisms

  • Software Security Assurance
  • Secure Software Initialization
  • Secure Boot Process
  • Software Security Architectures
  • Hardware Isolation
  • Secure OTA Updates - Digital Signature Approach
  • Secure OTA Updates - TPM-Based Approach
  • Component Identification
  • Secure Storage
  • Fuzz Testing Introduction
  • Incident Response Planning

Web Technologies & Side Channel Attacks

  • HTML/CSS Fundamentals
  • Web Security in Vehicles
  • Side Channel Attack Introduction
  • Video Analysis: Power Analysis Attack

HTML Entities & Side Channel Deep Dive

  • HTML Entities and Encoding
  • Side Channel Attack Deep Dive
  • Video Analysis: DPA Attack on AES
  • Defenses Against Side Channels

Automotive Ethernet Security

  • Network Security Fundamentals
  • Attack Categories
  • Layer 1 (Physical) Attacks
  • Layer 2 (Data Link) Attacks
  • Layer 3 (Network) Attacks
  • Layer 4 (Transport) Attacks
  • Layer 5-7 (Application) Attacks

Time Sensitive Networking (TSN) & Course Wrap-up

  • 802.1AS Time Synchronization (gPTP)
  • Stream Reservation Protocol (802.1Qat/SRP)
  • QAV - Credit-Based Shaper (802.1Qav)
  • TAS - Time-Aware Shaping (802.1Qbv)
  • Frame Preemption (802.3br/802.1Qbu)
  • Cyclic Queuing and Forwarding (802.1Qch)
  • Asynchronous Traffic Shaping (802.1Qcr)
  • AVB Gen 1 vs Gen 2 (TSN) Comparison
  • IEEE 1722 Transport Protocol (AVTP)
  • Automotive Industry Adoption
  • Course Wrap-up Discussion

Exam & Certification

What is this program intended to do?
What can I expect out of this program?
What type of learning should I expect?
Is there any certification at the end of the program?

For more details on Automotive Cyber Security

Call / WhatsApp@8429197412