Embedded Linux: from binary to source distributions
The webinar has ended - sorry you missed it! To keep up to date with the latest training webinars sign up for Doulos emails
What do you need to do to protect your Embedded Linux system?
How and when can you determine the security needs of your system?
This Webinar helps you address these issues by providing an overview of Embedded Linux security.
Key security concepts are introduced and unpacked to inform how they can influence the software development process. Specifically the Secure Software Development Lifecycle (SSDL) models are discussed in this context. Design and development security practices are also explored using network security, container technologies and well established Linux hardening techniques.
Doulos is delighted to bring this webinar presented and supported by Dr Carl Shaw, of embedded security consultants MathEmbedded, and Adrian Thomasset, Senior Member Technical Staff of Doulos Embedded.
The free webinar consists of a one hour session (see below for times) and is interactive with live Q&A.
- Introduction to security
- What is security?
- Terminology : assets, threats, vulnerabilities
- Information security : the IAS octave
- The Secure Software Development Lifecycle
- Protecting a Linux system against expected and unknown attacks
- Application security and sandboxing
- Network security
- Information security
- Hardening a Linux system
|If you have any queries, please contact firstname.lastname@example.org
NOW FULLY RELEASED: Project Ready Secure Embedded Training
5 days - Comprehensive Embedded Linux Security
This unique training class offered in partnership with MathEmbedded is available on dates in early December at Doulos Training Centers in the US, Germany and the UK.
This practical hands-on class has been designed from the ground-up for embedded systems developers who need to determine and secure the vulnerabilities in their system design. The course focuses on the capabilities and features that Linux provides to protect against security attacks and their application.