We offer an extensive portfolio of online training courses in the fields of hardware and software security. In this blog post, we provide an overview of these trainings, so that you or your development team can pick the most suitable one. Each training is available for individual purchase, and is delivered via our e-learning platform: the highly interactive and modular content is accessible on-demand, directly from your smartphone or laptop, and can be completed at your own pace.
We are also developing real-time online trainings and offer special terms for companies purchasing multiple seats. If you are interested in boosting the expertise of your team, feel free to get in touch with us via the form below or directly contact Justin Black at email@example.com.
Currently, our training portfolio includes two comprehensive training programs: a set of courses where we share our complete expertise on a specific topic. In addition to that, we offer standalone courses.
Secure Coding Fundamentals is an online, highly interactive course where we build on the tips and tricks used by software security analysts to review large codebases. This learning path consists of 5 training courses.
Memory Corruption Essentials
This course provides a thorough guideline into memory corruption issues. Most software developers know what a buffer overflow is. But there is no shortage of such coding mistakes in all types of software. We have created a course specifically to help developers address this problem. Although you cannot access this course fully separately, you can access a free trial by following this link.
Fault Injection for Software Developers
Learn how to assess the impact of instruction skipping and data corruption attacks on security-critical source code, and propose a cost-effective remediation plan by following our first online fault injection course for software developers. It is aimed at software developers and the experience with C/C++ programming is recommended. Register for this training now or if you are still in doubt check out the trial version of the course.
Side Channel Analysis for Software Developers
As part of the REASSURE project together with the University of Bristol and Université Catholique de Louvain, we will teach you how to protect your devices and applications against basic side-channel analysis attacks. It is vital to not only treat the algorithms from a theoretical perspective but also its physical (hardware or software) implementation in order to oversee and prevent security threats. You can access this training course here.
Countermeasures for Side Channel Analysis
The goal of countermeasures is to minimize the power analysis attacks. Therefore, during this course, you will learn what are the typical countermeasures for SCA and how to apply them efficiently by understanding theoretical foundations and the regular flow of an attack.
Understanding Leakage Detection
Just like SCA for Software Developers, this training was created as a part of REASSURE project. Leakage detection plays an increasingly important role in the security evaluation of cryptographic devices. A particularly popular approach is the Test Vector Leakage Assessment framework proposed by Cryptography Research Inc. This consists of a suite of simple statistical tests tailored to either confirm or rule out many typical forms of side-channel vulnerabilities. Learn more and access the tutorial now.
Click here to learn more and purchase this training program.
With the long-standing expertise in developing and securing automotive devices, we have created a special Automotive learning path. It bridges the gap between formalized safety frameworks such as ISO 26262, SAE J3061, the ISO/SAE 21434, and the best practices in security. The path consists of three parts, each of them covers a separate topic:
Part 1: Fast track your security
First, you will learn how to use the security terms right and improve your understanding of security risks. We further explain the typical lifespan of software and hardware solutions, the value and importance of testing and how you can reduce the costs.
Part 2: Security Requirements Engineering
Next, together with us, you will discover how to avoid pitfalls during the implementation of OEMs’ security requirements. To learn how to adhere to the requirements an in-depth overview of the five most common TARA methodologies is explained through a case study.
Part 3: Secure code development
Throughout 20 years various coding reviews have been identified to successfully discover vulnerabilities in code. In this last part, we not only explain how to create secure code but also identifying the costs of fixing vulnerabilities during product development and get tools to argue threat responses.
Learn more about the learning path and purchase it by following this link.
Our team is constantly working on improving our training courses and introducing new ones. Next week, look out for the new automotive course for the Automotive Security Architect learning path.