To use our site, you agree to the use of cookies and data processing according to our privacy statement.
Close
Search

Designing Secure Bootloaders training is available online

What is a secure bootloader? What are the most cost-efficient ways to design and protect a bootloader? What are and how to implement best security practices?

Find out about our online training

To answer these questions and more, Riscure experts have created online training for software developers called Designing Secure Bootloaders. We believe this is the first-ever course that offers a complete view on designing a robust Secure Boot implementation. This course is a perfect learning step for all software developers working on embedded devices, developing and implementing bootloaders, as well as for security architects.

The training consists of six chapters, each focusing on a topic that is critical for understanding and implementing secure bootloaders:

  1. Anatomy of a bootloader
  2. Threat Analysis Fundamentals
  3. Secure Bootloader building blocks
  4. Our first secure bootloader
  5. Common software pitfalls
  6. Common hardware pitfalls (coming soon)

The virtual lab that the training is based on enables students to practice building secure bootloaders as well as implement and test the solution proposed by the student.

Want a sneak peek? Check out the video from our trainers.

Riscure experts have also recently conducted a webinar specifically for this training. The webinar’s recording is available online after registration via this link. We have also created a blog post answering all your questions about the webinar.

Find out more about and book the training now. If you have any questions about the training or you want to create a special course for your team, feel free to contact us by submitting the form below.