Shhh - Stop Sharing Secrets: A Secure Mindset for Embedded Development
Offered By: Linux Foundation via YouTube
Course Description
Overview
Explore a comprehensive conference talk on secure embedded development practices. Gain insights into the industry's superpower and various dimensions of security. Delve into essential building blocks including Root Certificate Authority, Mutual TLS, Asymmetric Encryption, and Elliptical Curves. Examine HS Systems and the challenges in security implementation. Learn about additional security layers, good practices, and the importance of Trusted Execution Environment. Discover key concepts related to NXP, AWS IoT, and key rolling in operating systems. Equip yourself with a secure mindset for embedded development through this informative 43-minute presentation by Andy Doan and Ricardo Salveti from Foundries.io, hosted by the Linux Foundation.
Syllabus
Introduction
Whats the big deal
Our industry has a superpower
Different dimensions to security
Building blocks of security
Root Certificate Authority
Mutual TLS
Asymmetric Encryption
Elliptical Curves
HS Systems
The Bad News
Security in General
Additional Layers
Good Practices
Trusted Execution Environment
Questions
NXP
Summary
AWS IoT
Key Rolling
OS
Taught by
Linux Foundation
Tags
Related Courses
CompTIA Security+ (SY0-601) Cert Prep: 7 Endpoint Security Design and ImplementationLinkedIn Learning SSCP Cert Prep: 7 Systems and Application Security
LinkedIn Learning The Internet of Insecure Things - 10 Most Wanted List
YouTube ICEFALL - Revisiting A Decade Of OT Insecure-By-Design Practices
Hack In The Box Security Conference via YouTube Low Level BootROM Protocol Fuzzing Secure Memory Regions
Hack In The Box Security Conference via YouTube