TST 291: Classes of Security Defects - IoT Embedded Systems
This course module provides additional training on classes of security defects and is of particular importance to embedded software engineers. It includes mapping of content to specific compliance and regulatory requirements, links to key reference resources that support the topics covered in the module, and a "Knowledge Check" quiz that assesses mastery of key concepts.
Upon completion of this course, participants will be able to:
- Identify specific embedded system defects and common attack vectors.
- Explain how to prevent the embedded system defects from becoming vulnerabilities with the help real-life example of the Koyo ECOM line of PLCs.
- Understand the use of a hashing algorithm obfuscated with unique "salt" values.
- Understand path traversal attacks.
This course can be customized for Instructor-Led training. Course contents and duration may vary. Contact us for details.