| Courses Software Training | Locality Ameerpet |
For more details Please contact LEARNCHASE
www.learnchase.com
Whatsapp: +918123930940
E-mail Id: [email protected]
E-mail id: [email protected]
COMPREHENSIVE EMBEDDES LINUX SECURITY For EMBEDDES SYSTEMS ONLINE TRAINING
Structure and Content
Day 1
Security fundamentals
What is security and why is it necessary? Security concepts and terminology Attackers : the who and why Security guiding principles
The Secure Software Development Lifecycle
What is a secure software security lifecycle? The SSDL process : Architecture and design Attack surface reduction The threat modeling process Security assessment Practicals: Creating a threat model Defining security requirements
Common attacks and mitigations
How embedded systems are attacked Fundamental system software vulnerabilities Application level attacks Attacks against the system Practical: Common attacks and protecting against them
Day 2
Booting a Linux System
The bootloader Debug and trace Building a chain of trust The Linux Kernel interface Example boot scenarios and fast boot Hibernation and security Practical: Signing and verifying code
Linux Kernel Security
Introduction to Linux Kernel Security Hardening the kernel Kernel modules Crypto subsystem and key management Random Number Generation Practical: Adding a security patch to a standard kernel
Day 3
Securing the runtime environment
Dynamic loading The Linux Dynamic Linker Limiting resources Practical: Dynamic linking
Information security
Data at rest and in use Linux filesystems Restrictions on Linux software Advanced filesystem control Extended Attributes and Access Control Lists Confidentiality, Integrity and Authenticity Caching and security Overview of SoC hardware security features
Application partitioning
Access models The Unix security model Process privileges and capabilities Process resources and execution Securing inter-process communication Sandboxes Practical: Implementing an LXC sandbox
Day 4
Linux Security Modules
Introduction to LSMs Overview of LSMs Access Control Mechanisms SELinux LSM Practical: adding LSM hardening to an LXC sandbox
Security testing and release control
Testing and the Secure Software Development Lifecycle Release management Test tools Practical: basic penetration testing
Day 5
Developing and building secure software
Writing secure software The secure software developer Coding conventions and standards Working with sensitive data and algorithms Code review and test Choice of programming language
For more details Please contact LEARNCHASE
www.learnchase.com
Whatsapp: +918123930940
E-mail Id: [email protected]
E-mail id: [email protected]