What are you looking for?
Secure Bootloader Design Training
Learn how to fix common security mistakes in bootloader implementation through hands-on exercises.
Training at a Glance
Designing Secure Bootloaders
Most embedded devices have strong requirements for the integrity of the code running on the platform. Attackers are adept at finding new ways to compromise these systems. A robust, secure boot implementation that ensures software integrity is essential, and the implementation presents a major challenge. Several attacks on widely deployed embedded devices received high-profile media attention, exposing manufacturers to lost revenue, liability claims, and brand damage.
This training helps architects, designers, and developers of bootloaders learn how to correct and avoid common security mistakes through hands-on exercises in a virtual practice environment. Participants will identify vulnerabilities and secure an existing bootloader. By building a foundational knowledge of the design building blocks for secure boot and understanding various state-of-the-art threats, participants will gain the competencies and the confidence to tackle difficult decisions head-on.
Training Outline
Related Trainings
Interested in this service? Reach out to learn more.