Secure System Design and Development - start the course
- describe how anchoring the trust of a system within hardware using TPM, SED, and HSM improves security
- describe the benefits of secure system booting and how UEFI plays a role in it
- identify how systems may be protected from EMI and EMP
- identify when security needs to be considered in the supply chain
- recall key considerations of a secure operating system
- describe the concept of a trusted operating system
- describe the security concerns and considerations when using wireless keyboards and mice, displays, Wi-Fi enabled MicroSD cards, printers, usb storage, and digital cameras
- define secure development concepts
Security of Embedded Systems - describe the security concerns of SCADA, IoT, and HVAC
- describe the security concerns of SoC and RTOS
- describe the security concerns of multi-function devices, camera systems, medical devices, vehicles, and aircraft
Secure Application Dev and Deployment - compare waterfall and Agile development life cycle models
- describe the importance of security with DevOps
- define various development concepts
- describe various techniques that are used for secure coding
- define various methods for code quality and testing
- compare compiled code vs. runtime code
Practice: Secure Design and Development - recall various concepts related to secure system design and application development
|