Wind River Education Services Course Catalog

Wind River Education Services offers cost-effective training in various forms. Browse our course catalog below to plan and track a curriculum that will satisfy the training needs of your device software development engineers.

Embedded Security Essentials = NEW =

Buy Now

Course Description

Course Results

Products Supported

Who Should Attend

Course Format

Please see course datasheet for further details here Buy Now

Course Details Summary

  • Duration: 2 Days
  • Course Information: View
  • Format: Lectures and Labs
  • Type: Instructor-led
  • Price/Schedule: View

The Embedded Security Essentials course covers a wide range of software security topics in the specific context of embedded systems. Attendees will learn how security practices and protocols apply to the embedded industry, and how they impact requirements and design.

After this course, participants will be able to perform the following:

  • Identify the key challenges in creating a secure device
  • Describe the basics of encryption and keys
  • Contrast secure boot on different architectures
  • Describe significant elements of network security, including SSH, SSL, IPsec, and IKE
  • VxWorks® 7.0
  • The following targets are available:
    — Wind River® Simics® simulated targets
  • Application developers
  • Platform developers
  • System architects
  • Testers

Day 1

Introduction to Embedded Security

  • Definitions
  • What is security?
  • Regulation, standards, and references
  • Lifecycle management
  • Designing for security
  • LAB: Exploring Network Security Threats

Privacy Implementations

  • Confidentiality and privacy
  • Categories of ciphers
  • Symmetric ciphers
  • Asymmetric ciphers
  • Cryptanalysis
  • Sources of information
  • LAB: Working with Ciphers

Integrity Implementations

  • Integrity decompositions
  • Hash functions
  • Keyed-hash message authentication code
  • Digital signatures
  • Sources of information

Availability Implementations

  • Availability decompositions
  • Whitelisting
  • Intrusion protection
  • Management
  • Countermeasures

Security Building Blocks—Keys and Hardware

  • What is a key?
  • Public vs. private keys
  • Diffie-Hellman and RSA
  • Managing keys and certificates
  • How random is your hardware?
  • Is the hardware up to the challenge?
  • LAB: Creating an X.509 Certificate

Boot Process

  • Secure boot
  • LAB: Using a VxWorks Secure Boot with UEFI

(Optional) Intel Architecture Security Features

  • Trusted Platform Module 2.0
  • Unified Extensible Firmware Interface
  • Measured launch environment
  • Launch control policy

Day 2

Firewall Overview

  • Introduction
  • Stateful firewall example
  • Firewall concepts
  • Firewall implementations
  • Linux iptables
  • LAB: Configuring a Firewall

SSL

  • Overview
  • SSL architecture
  • SSL and security
  • Handshake process
  • SSL session
  • VPN using SSL
  • LAB: Building a Secure Connection with SSL

SSH

  • Overview
  • SSH architecture
  • Security in SSH
  • SSH features
  • OpenSSH
  • Competing protocols

IPSEC/IKE

  • Overview
  • IPsec architecture
  • Security association and SPD
  • AH and ESP
  • Key management in IPsec
  • IKEv1
  • IKEv2
  • LAB: Building Secure Sessions with IPsec and IKE

Security Profile for VxWworks 7

  • Security Profile for VxWorks 7
  • User management
  • Encryption
  • Secure networking
  • Secure boot
  • Encrypting the file system
  • LAB: Managing User Authentication

Prerequisite Courses

Prerequisite Skills

  • Understanding of embedded programming concepts
  • One year of C or C++ programming experience on Linux/UNIX
  • This two-day expert-led course consists of lectures and lab sessions.
  • Attendees use VxWorks 7.0 and Wind River Workbench 4.0 to gain experience with the topics presented.
  • Participants receive individual guidance from an expert engineer who has extensive experience with Wind River technologies.