image
The Ultimate Drawing Course Beginner to Advanced...
$179
$79
image
User Experience Design Essentials - Adobe XD UI UX...
$179
$79
Total:
$659

Description

Increased incidences of vehicle cyber-attacks and major car recalls by OEMs have raised awareness of automotive cybersecurity among OEMs worldwide. Furthermore, rising government mandates for the incorporation of various safety features, such as a rear-view camera, automatic emergency braking, a lane departure warning system, and electronic stability control, have created new opportunities for automotive cybersecurity service providers worldwide. As a result, the automotive cybersecurity ecosystem include a number of start-ups. Government ambitions to establish an intelligent transportation system have also increased global demand for cybersecurity solutions. In addition, the introduction of 5G technology is likely to boost market growth in the future years. In the context of road vehicles and cars, cybersecurity refers to the protection of automotive electronic systems, communication networks, control algorithms, software, users, and underlying data against malicious attacks, damage, illegal access, or manipulation. In the context of road cars, cybersecurity refers to the protection of automotive electronic systems, communication networks, control algorithms, software, users, and underlying data against malicious attacks, damage, illegal access, or manipulation. This course is specially crafted towards bringing all the topics of Automotive Cyber Security in one place. Also the course would include all the pre requisite for getting strong ground in Automotive Cyber Security.
Who this course is for:
Cyber Security enthusiast , Automotive Security Professionals, Security Developers and Security Managers

What you'll learn

Learners would be able to grasp the basic foundation of Cyber Security including Encryption, Digital Signature & Certificate, Hashing, PKI, CIA triad

The course will cover key concepts of Automotive Software Sector like Network Topology, Gateway ECU, Domain Controllers, Autosar Architecture

Learners would be able to connect the difference between safety and security, Grip on concepts like Layered Security Approach, Smart Card Integrated Circuits

Competency on Security Controls like Secure OnBoard Communication, Secure Flashing, Secure Diagnostic, Secure Boot, Hardware Protection, Secure Storage

Requirements

  • You will need a copy of Adobe XD 2019 or above. A free trial can be downloaded from Adobe.
  • No previous design experience is needed.
  • No previous Adobe XD skills are needed.

Course Content

27 sections • 95 lectures
Expand All Sections
1-Introduction
1
1.1-Introduction to the course
2-Starting with the Fundamentals
4
2.1-What is Cyber Security?
2.2-Three Pillars of Security: The CIA TRIAD
2.3-The Plus One Logic
2.4-Testing the fundamentals
3-Cryptography Foundation
13
3.1-Encryption
3.2-Symmetric Encryption
3.3-The Key Problem
3.4-Asymmetric Encryption/ Public Key Encryption
3.5-Efficient Encryption Design
3.6-Hashing
3.7-Hashing Vs Encryption
3.8-Digital Signature
3.9-Signature Vs Encryption
3.10-Signature & Encryption Together
3.11-Back to the TRIAD
3.12-Examples of Cryptographic Algorithm
3.13-Testing the Cryptography Foundation
4-Public Key infrastructure
8
4.1-Look Back at the Solution
4.2-What are Digital Certificates?
4.3-Verification of Digital Certificates
4.4-Generation & Structure of Digital Certificates
4.5-Hierarchy of CA
4.6-Functions of CA
4.7-Anatomy of PKI
4.8-Testing the Public Key Infrastructure
5-Automotive Foundation Concepts
4
5.1-Gateway ECU
5.2-Automotive Network Topology
5.3-Safety Vs Security
5.4-Testing the Automotive Foundation Concepts
6-Fundamentals of Autosar
5
6.1-Introduction to Autosar
6.2-Refresher: Autosar COM Stack
6.3-Refresher: Autosar Diagnostic Stack
6.4-Autosar Crypto Stack
6.5-Testing the Fundamentals of Autosar
7-Security Driver Architecture
3
7.1-Crypto Drivers
7.2-Introduction to HSM
7.3-Testing the Security Driver Architecture
8-Automotive Security Paradigm
15
8.1-Layered Automotive Security Approach
8.2-Automotive Security Controls
8.3-SecOC Message Transmission in Vehicle Bus
8.4-SecOC Message Format
8.5-Types of Freshness Value
8.6-SecOC Functional Overview
8.7-Transmission Flow
8.8-Reception of SecOC Messages
8.9-Build Up to Secure Diagnostic
8.10-Secure Access in Automotive Diagnostic
8.11-Secure Flash
8.12-Booting and Security associated with it
8.13-Hardware Protection
8.14-Secure Storage Area
8.15-Testing the Automotive Security Paradigm
9-Bonus
1
9.1-Bonus