Created by useiconic.comfrom the Noun Project

Securing Embedded Linux Systems

Cyber-security is no longer optional in the embedded world, where threats are multiplying and standards have to be met. This is particularly true when it comes to Linux systems, which combine hundreds of software components and libraries, each of which may harbor a vulnerability. This training course will enable participants to master this complexity and the various methods for securing their embedded systems at every level.

Course outline

Day 1

  • Introduction to cybersecurity
  • Notions of cryptography
  • Hardware security
  • Trusted boot

Day 2

  • Toolchain hardening
  • Assembling a secure Linux distribution
  • Linux kernel hardening

Day 3

  • Linux userspace hardening
  • Services hardening
  • Network security

Audience

This course is designed for developers interested in securing their embedded Linux systems. It can be adapted according to profiles and needs of trainees.

Prerequisites

  • Command-line handling of a GNU/Linux environment
  • Knowledge of embedded Linux distribution architectures