Global training solutions for engineers creating the world's electronics

Welcome attendees of the IoT Security Foundation Conference

Thanks for taking the time to visit Doulos at this year's conference

This page has brought together a range of Doulos courses and FREE webinars and tutorials for you. Enjoy! 

If you would like to explore embedded security training options with Doulos, check out the listing below and then contact your local Doulos team directly, or complete a webform*. 

Upcoming KnowHow Webinars

This webinar explores common mistakes and solutions to memory usage in C and C++ using the heap.

The webinar includes:

  • Approaches to avoiding memory usage bugs by illustration
  • Contrasts between the C and C++ programming languages

The presentation applies to general purpose programming, small embedded systems (bare-metal and RTOS) and large embedded (Linux) systems. A minimal knowledge of C and/or C++ is required to attend.

REGISTER NOW FOR THIS FREE KNOWHOW WEBINAR »

In this webinar we examine some of the main features and tools which can be used to make your embedded Linux system more secure. We can see how features of the compiler, the kernel and Linux user space can be used to satisfy the requirements of one of the main security standards used for consumer electronic devices. We'll review some of the hardware features provided by SoC vendors to increase security, using the AMD Versal™ Adaptive SoC as an example.

Agenda:

  • Introduction to security
  • Tools and secure compilation
  • Securing the Linux system
  • Securing the kernel
  • Hardening the boot process
  • Vendor support for security

REGISTER NOW FOR THIS FREE KNOWHOW WEBINAR »

Check out the latest live webinar schedule »

KnowHow Webinars On-Demand and Tutorials

This article covers cybersecurity regulations, security technologies, and security courses offered by Doulos to help you develop and implement an effective security strategy for your organization.

VIEW THIS ARTICLE ON THE DOULOS WEBSITE NOW »

In this webinar we explain (in as few words as possible) what a Software Bill Of Materials (SBOM) is and why we need to know about them in embedded systems development.

The Webinar covers:

  • The main uses cases for an SBOM and the different data formats which can be used
  • How SBOM information can be generated automatically with build systems and tools like the Yocto Project
  • Some of the open-source tools which can be used to process, track and consume SBOM data.


We also take a look at what our webinar partner, Toradex, does regarding SBOMs and Common Vulnerabilities and Exposures reports, and how they are helping companies to comply with upcoming cyber-security regulations (including the implementation of traceability and integrity guarantees on their Torizon OS).

REGISTER & VIEW THIS WEBINAR NOW »

Security vulnerabilities resulting from software defects have been studied extensively. The MITRE corporation's list of Common Vulnerabilities and Exposures (CVE) is widely used and has been maintained for almost 20 years! It turns out that weak security is often a direct result of using software language constructs and coding styles that could have been avoided. The problem is that many software developers are not aware of potential insecure features lurking in their code!

Secure coding standards provide guidelines and rules to prevent common security vulnerabilities. Manual checking for coding standard compliance is tedious and error-prone. Static analysis tools can automate the process while also detecting violations that might be missed by other testing approaches.

This webinar highlights rules from the CERT C and MISRA C coding standards that are appropriate for a small embedded system. It will demonstrate how the Perforce Klocwork static analysis tool can apply these rules to identify and fix security vulnerabilities in a typical embedded application, written in C and running under a real-time operating system.

REGISTER & VIEW THIS WEBINAR NOW »

C is the most widely used programming language for embedded application. Although a powerful language, it is widely understood this this power has the downside that unsafe, insecure and unreliable code is all to easy to write. A good solution is to develop code that is compliant with an appropriate set of guidelines that help avoid the pitfalls.

MISRA C and CERT C are two examples of such guidelines.

In this webinar, these two standards are introduced, compared and contrasted, so you have opportunity to make an informed choice for your specific project. Each of the two standards has some excellent characteristics, but every embedded project is different; one size does not fit all!

REGISTER & VIEW THIS WEBINAR NOW »

News items about security vulnerabilities in IoT devices are alarmingly common! Security should be a key objective during the development of every connected embedded device but sadly, that is often not the case. Today, there are numerous security standards and frameworks that could provide guidance but developers are often unsure which ones to follow. Future regulations are likely to require products to be certified against an emerging set of IoT security standards but how should developers get started?

This webinar explores the range of IoT Security Standards, common features, requirements and introduces the concept of security evaluation for IoT platforms, including its applicability with the use case from NXP LPC55Sxx MCU.

REGISTER & VIEW THIS WEBINAR NOW »

Dr David Long, Doulos Principal Member Technical Staff, looks at how to get started on a "small embedded" system built around a microcontroller and firmware running "Bare Metal" or with a Real Time Operating System (RTOS). 

VIEW THIS TUTORIAL ON THE DOULOS WEBSITE NOW »

View all on demand webinars available »

Secure Embedded Courses

About Doulos Secure Embedded Training

Understanding and managing all aspects of system security design in the ‘well connected world’ is of fundamental concern. For many developers and manufacturers, and particularly those that previously didn’t need to consider security in product design, this will require changes in how they bring products to the marketplace and also manage them once there. The highly experienced Doulos team have the knowledge and skills, gained from the international semiconductor industry, to deliver the right training and support for you and your organization.

Doulos training is unique in that it includes extensive hands-on labs covering all aspects of the design process. Doulos delegates therefore benefit from a complete learning experience which enables them to test, troubleshoot and consolidate their knowledge before returning to their design teams.

Contact Doulos now »

Looking for team-based training, or other locations?

Complete an enquiry form and a Doulos representative will get back to you.

Enquiry FormPrice on request