• ESCRYPT Trainings

    Security trainings

    Dive into the world of embedded security!

ESCRYPT has long since stopped teaching only the basics of cryptography in its training courses. Instead, the company channels its years of experience in embedded security, gained during numerous industry projects, to provide practical examples and the latest technological developments.

ESCRYPT is the leading systems supplier for embedded security, with many years of experience. Its training courses impart a solid understanding of security for embedded devices, thereby laying the foundation for the development of secure technologies.

Eingebettete Sicherheit für Fahrzeuge

Embedded security for vehicles

Few things stir the automotive world to such strong emotion as the prospect of selfdriving vehicles. Where some see enormous gains in comfort, convenience, and safety, others are concerned about automotive autonomy and hackers attacking their vehicles. Yet the need for effective embedded security in vehicles was on the rise before the advent of the automated vehicle. Today’s vehicles already need protection against odometer manipulation, unwanted access to vehicle electronics, and many other threats.

The “Embedded security for vehicles” seminar series was designed specifically for the automotive industry and offers the appropriate level of detail for management as well as for product managers and developers.

mehr erfahren

Embedded security for vehicles: For managers

This seminar is for all levels of management that require a basic understanding of security so that they can establish suitable, cost-effective security measures in their own areas of responsibility.

Seminar topics:
  • Security threats to automotive systems
  • Secure development
  • Multilevel protection concepts
  • Key security technologies for the challenges of today and tomorrow

Security in an automotive context (Parts 1 and 2)

This training course is designed for product managers, project managers, and product developers for whom application-based knowledge of embedded security is an important tool in secure automotive development. Part 1 provides a broad introduction to the fundamentals of security and can be held as a stand-alone session for employees who do not require further detail. Part 2 builds on the fundamentals by going into greater depth with exercises and case examples.

Part 1 (one day)
  • Security fundamentals
  • Risk analysis
  • Algorithms and protocols
  • Secure product lifecycle
  • Security principles
Part 2 (two days)
  • Security fundamentals
  • Tools and processes
  • Use cases and hardware-based protection
  • Secure software development
Secure product design

Secure product design

When developing embedded devices, the earlier that security functions can be taken into consideration, the easier they are to implement. ESCRYPT’s “Secure product design” course provides all the information necessary for secure product development.

mehr erfahren
Seminar topics:
  • Security fundamentals
  • Secure software development for the entire product lifecycle
  • Algorithms and protocols
  • Authentication and authorization
  • Security principles
  • Choice of secure coding or fundamentals of risk analysis

“Secure product design” is equally suitable for product managers, project managers, and product developers.

Security für vernetzte eingebettete Geräte

Security for connected embedded devices

With the increasing connectivity of embedded systems, the security requirements for devices are also changing. In the “Security for connected embedded devices” course, participants learn the fundamentals for products that feature secure communication.

mehr erfahren
Seminar topics:
  • Use cases for connected devices
  • Fundamentals of connectivity
  • Authentication in depth
  • Secure communication
  • Securing communication interfaces
  • Web services

This course is aimed at product managers, project managers, and product developers who are responsible for the analysis and definition of security requirements and their implementation in protection concepts for connected systems. Participants need to have a firm grasp of the cryptography fundamentals as taught in the “Secure product design” course.

ISO 9001-2008 Home