Created by useiconic.comfrom the Noun Project

Securing Embedded Linux Systems

Cyber-security is no longer optional in the embedded world, where threats are multiplying and standards have to be met. This is particularly true when it comes to Linux systems, which combine hundreds of software components and libraries, each of which may harbor a vulnerability. This training course will enable participants to master this complexity and the various methods for securing their embedded systems at every level.

Course outline

  • Cryptography basics for selecting the right algorithms
  • Hardware threats to an electronic system
  • Trusted boot and Secure boot
  • Recommendations for assembling a Linux distribution
  • Learning to configure the Linux kernel for security
  • Exploring disk encryption technologies
  • Methods for isolating application services
  • Hardening network configuration

Audience

This course is designed for developers interested in securing their embedded Linux systems.

Prerequisites

  • Command-line handling of a GNU/Linux environment
  • Knowledge of embedded Linux distribution architectures