Created by useiconic.comfrom the Noun Project

Embedded Linux Security

Cyber-security is no longer optional in the embedded world, where threats are multiplying and standards have to be met. This is particularly true when it comes to Linux systems, which combine hundreds of software components and libraries, each of which may harbor a vulnerability. This training course will enable participants to master this complexity and the various methods for securing their embedded systems at every level.

Course outline

  • Cryptography basics for choosing the relevant algorithms
  • Hardware threats to electronic systems
  • Trusted boot and Secure boot
  • Recommendations for assembling a Linux distribution
  • Configuring the Linux kernel for security
  • Isolation methods for application services
  • Network configuration hardening

Audience

This course is designed for developers interested in securing their embedded Linux systems.

Prerequisites

  • Command-line handling of a GNU/Linux environment
  • Knowledge of embedded Linux distribution architectures