Automotive Cyber Security

Automotive Cyber Security

Rs.30,000.00

18% GST Extra

Please login to purchase the course.

SKU: cid_195165 Category:
Overview

Systems that are connected to other systems are vulnerable to cyberattacks. This is just as applicable to automotive electronics as it is to IT systems connected to digital services. This is where our training courses come in. We offer you a fundamental introduction to cyber-security and information security, from analyzing threats and risks to defensive strategies. Each training session concentrates on different methods, standards, and guidelines, providing you with a comprehensive overview of the topics covered by automotive security.

Training Overview of Topics

From introductions for people new to the topic to briefing sessions for decision-makers, our automotive cybersecurity courses go over and beyond technical questions to look at all relevant topics. One big message that we convey is that comprehensive protection is a challenge to entire companies. This is because operational and organizational structures can be an open invitation to intruders to invade your electronic systems. As well as looking at established standards and guidelines, we also consider the future of the ISO/SAE 21434 standard and show how to methodically and systematically shield your automotive electronic systems from cyberattacks.

All courses are also available as in-house staff training courses, which we can tailor to your requirements and hold at your place of work.

Course Features
  • 24X7 Access: You can view lectures at your own convenience.
  • Online lectures: Online lectures with high-quality videos.
  • Hands-on practice: Includes source code files for hands-on practice.
Test & Evaluation

1. During the program, the participants will have to take all the assignments given to them for better learning.

2. At the end of the program, a final assessment will be conducted.

Certification

1. All successful participants will be provided with a certificate of completion.

2. Students who do not complete the course / leave it midway will not be awarded any certificate.

Course Content

Introduction

  • Hope for the Best, Prepare for the Worst
  • Outline
  • Summary of Research Contributions
  • Security Threats in the Automotive Domain
  • Security Requirements Engineering in the Automotive Domain
  • Vehicular IT Security Technologies and Security Mechanisms
  • Intellectual Property, Expertise, and Software Protection in the Automotive Domain
  • Related Work

Brief Background in Security and Cryptography

  • Enforcing the Secrecy of Secrets
  • Symmetric-Key Cryptography
  • Data Encryption Standard
  • Advanced Encryption Standard
  • Asymmetric-Key Cryptography
  • Rivest Shamir Adleman
  • Elliptic Curve Cryptography
  • Recommended Key Lengths
  • Hash Functions
  • Message Authentication Codes
  • Block Cipher Based Message Authentication Codes
  • Cryptographic Implementations
  • Software Implementations
  • Trusted Computing Technology
  • Trusted Computing Components
  • **Trusted Platform Module**
  • **Core Root of Trust Measurement**
  • **Trusted Software Stack**
  • Trusted Computing Basic Functionalities
  • **Secured Cryptography**
  • **Authenticated Booting**
  • Binding and Sealing
  • Remote Attestation
  • Trusted Channels
  • Security Schemes in the Automotive Domain
  • Digital Signatures
  • Digital Signatures 1
  • Key Exchange and Hybrid Encryption
  • Public-Key Infrastructure 1
  • Challenge-Response Protocol
  • Cryptanalysis

Security Critical Vehicular Applications

  • Introduction
  • Theft Protection
  • Electronic Immobilizer
  • Remote Door Lock
  • Counterfeit and Intellectual Property Protection
  • Counterfeit Protection
  • Intellectual Property Protection
  • Software Updates
  • After-Sale Applications
  • Feature Activation
  • Infotainment
  • Legal Applications
  • Milage Counter
  • Electronic License Plate
  • Digital Tachograph
  • Event Data Recorder
  • Electronic Log Book
  • Road Pricing
  • Vehicular Communication
  • In-Vehicle Communication
  • Vehicle-to-Device Communication
  • Vehicle-to-Infrastructure Communication
  • Vehicle-to-Vehicle Communication
  • Vehicle-to-Infrastructure Communication
  • Protection of Safety-Critical Applications
  • Privacy Protection

Attackers and Attacks in the Automotive Domain

  • Attackers in the Automotive Domain
  • Attacks in the Automotive Domain
  • Logical Attacks
  • Cryptographic Attacks
  • Software Attacks
  • Communication Attacks
  • Physical Attacks
  • Monitoring and Sidechannel Attacks
  • Denial of Service Attacks
  • Fault Attacks
  • Penetration Attacks
  • Modification Attacks
  • Exploit of Testing Functionality
  • Further Attacks

Security Analysis and Characteristical Constraints in the Automotive Domain

  • Security Objectives Analysis
  • Security Requirements Engineering
  • Characteristical Advantages
  • Characteristical Constraints
  • Technical Constraints
  • Non-Technical Constraints

Vehicular Security Technologies

  • Physical Security
  • Tamper-Evidence
  • Tamper-Resistance
  • Tamper-Detection
  • Tamper-Response
  • Security Modules
  • Software Module
  • Security Controller
  • Trusted Platform Module
  • Security Box
  • Vehicular Security Architectures
  • Central Security Architecture
  • Distributed Security Architecture
  • Semi-Central Security Architecture

Vehicular Security Mechanisms

  • Why Proper Security Application is Hard
  • Cryptographic Component Identification
  • Physically Unclonable Functions
  • Secure User Authentication
  • Software Protection
  • Secure Software Development
  • Secure Software Design
  • Secure Software Implementation
  • Software Security Assurance Evaluation
  • Secure Software Initialization
  • Checksums
  • Cryptographic Hash Functions
  • Message Authentication Codes
  • Digital Signatures
  • Protection
  • Verifiable Initialization (TCG)
  • Software Security Architectures
  • Virtualized Security Architecture
  • Virtualized Security Architecture
  • Virtualized Security Architecture
  • Monolithic Security Architecture
  • Hardware Isolation
  • Secure Software Updates
  • General Approach based on Digital Signatures.
  • Trusted Computing based Approach
  • Secure Storage
  • Secure Communication
  • In-Vehicle Communication Security
  • In-Vehicle Communication Networks
  • Exemplary Exposures of In-Vehicle Communication Networks
  • In-Vehicle Communication Security Mechanisms
  • Vehicle-to-Device Communication Security
  • Vehicle-to-Infrastructure and Vehicle-to-Vehicle Communication Security
  • Vehicular Key and Certificate Infrastructures
  • Privacy-Preserving Message Origin Authentication
  • Secure Positioning
  • Communication Integrity

Organizational-Security

  • The Safety of Secrets
  • Achieving Organizational Security in the Automotive Domain
  • Organizational Security Measures in a Vehicular Lifecycle
  • Research and Development
  • Manufacturing
  • Service and Maintenance