Common Criteria for Developers & EvaluatorsRiscure Academy - Private Classroom Training
A multi-day program tuned to your context, audience, and timelines, designed to help both developers and evaluators streamline the Common Criteria certification process.
20+ hours self-paced eLearning and practical exercise
4.5 hours Live Mentoring
80% or higher on final assessment
Team report (pre vs post assessment)
Scheduled live mentoring
Spaced for efficiency & effectiveness
Scale to multiple groups
After this program participants will be able to
Recognize security assets in a TOE
Understand how to apply the attack tree method
Rate and select attack paths
Describe main methods of defence
Use open source tooling to identify PCB interfaces
Determine relevance of a component for security
Understand relevance of a component to an attacker
Create and apply countermeasures
Defence & Countermeasures
Evaluate required security properties of an asset
Understand modern threats: implementation attacks, SCA, FI
Understand the role of team work in implementation of security primitives
Understand how modern countermeasures can protect against modern threats
Developers: understand CC and deliverables to support a successful evaluation.
Evaluators: understand CC to successfully perform evaluations according to the standard.
Managers: peace of mind your teams are equipped for the rigor of a CC evaluation.
No specific background required
Engineering / Security background preferred
Relevant for anyone working with embedded systems, from decision-makers to engineers
Understand security engineering principles
Understand an embedded system holistically
Setup protections against attacks
Intro to CC
- Understanding the CC standard from different perspectives
- Certification roles and mutual recognition
- EUCC development
- CC in your company context
Common Criteria Standard
Defining, understanding, and applying the ins and outs of:
- APE & ASE – Protection Profile& Security Target
- AGD – Security Guidance
- ADV – Development
- ATE – Testing
- AVA – Vulnerability Analysis
- ALC – Life-Cycle
Actionable and indispensable knowledge of security in Embedded Systems and IoT devices. Training on hardware and software security in a classroom setting, online or hosted in your own knowledge program.
What people say
“Very interesting learning approach and material across different aspects of state-of-the-art SoC development with Security in mind. I really want to thank Riscure for offering such good trainings, and the their trainers who make amazing use of their skills, experiences and kindness to easily communicate complex concepts to the audience.”
Get Started Today
Don’t let your organization’s embedded systems become an easy target. Invest in the security and success of your business by partnering with Riscure Academy. Contact us today to discuss your training needs and explore our approach. Together, we’ll empower your team to secure your organization’s future.
Frequently asked questions
Do you do individual training?
What is the minimum group size for your expert-led training program?
Are your programs delivered online or as classroom ?
customer's location. Our online programs blend self-paced e-learning, exercises, assessments, and in certain cases expert-sessions (like Q&A webinars or Group Exercises) with Riscure experts.
When can we start with the training/ what do the training schedules look like?
Does customer have access to the training materials after the program?
For expert-led group training, including online/hybrid and classroom formats, access to relevant training materials remains available after the training period. The formal training schedule with deadlines is coordinated between Riscure and the customer.