On Demand

Embedded Linux Hardening and Firmware Security

While the process of implementing an embedded system is often within reach for numerous use cases, imbuing its design with a strong emphasis on security presents a distinct challenge. In this comprehensive training program, participants will not only gain insight into the nuances of embedded systems but also delve into the intricate realm of secure design practices.

Our aim is to equip attendees with an in-depth understanding of common pitfalls that can compromise security and to empower them with the knowledge needed to circumvent such issues effectively. Through a series of illustrative examples, we will not just introduce various hardening and debugging methods, but we will also elucidate their practical applications, ensuring that participants leave with not only theoretical knowledge but also the practical skills to implement secure embedded systems.

Agenda

  • User authentication and administrator access
  • Bootloader lock down
  • Network security
  • Lock down of network services
  • Update policy
  • Serial port access
  • Secure/trusted boot
  • Secret storage
  • Userspace hardening
  • Kernel hardening
  • Sandboxing using different methods: seccomp, namespaces, resource control
  • Collecting core files
  • GDB Tutorial
  • Remote debugging with GDB
  • Defensive and secure programming guidelines
  • Catching kernel logs
  • Analyzing kernel errors/crashes
  • Watchdog best practices

Experts

Portrait of a man with fedora hat, glasses, beard.
Richard Weinberger
Linux Specialist
Richard is co-founder of sigma star gmbh where he offers consulting services around Linux and IT security. Upstream he maintains various subsystems of the Linux kernel such as UserModeLinux and UBIFS. Beside of low level and security aspects of computers he enjoys growing lithops.

Benefits

Penguin with safety glasses working with a soldering iron.
Practical Training for Real-World Success
Our hands-on workshops prepare your team for actual scenarios, building confidence and ensuring they're ready to tackle challenges in the workplace.
Penguin in frontal view, next to him in big letters the words 10 max.
Small Groups, Better Results
Team learning with small groups: Our recipe for successful trainings. It means personalized attention, easier engagement in discussions, and a focused environment.

FAQ

Are your trainings also available in German?

Ja, wir sprechen auch Deutsch.

Do I need a specific training platform to take part in a training?

No, you don't need to worry about anything. Sigma star gmbh provides the training platform, and you will receive access to it.

Do I get the training material afterwards?

Sure! All presented material will be available to attendees after the session.

Do you also offer in-house trainings?

Yes, we provide in-house workshops for our custom trainings. They are available upon request: Contact us to book your in-house session.

How big is the group per training?

The training is limited to 10 persons. Larger trainings are available upon request.

What timezone will the training be conducted in?

Our base timezone is CET; however, we can arrange customized training slots to align with your specific time zone upon request.

Can you help us with NIS2, EU CRA, IEC 62443, EN 303 645, or another security standard?

Yes! There are quite a lot of new security standards that bring new requirements and often uncertainty about what to implement. We can help you out there! Feel free to request a custom-tailored training session for your specific use case and requirements.

The answer you were looking for is not in the list?
Feel free to write us anytime an E-Mail: trainings@sigma-star.at.
We’ll be happy to assist you.

Audience

Developers

Format

Remote

Duration

1 Day

Icon with a waving hand

Get in touch

+43 5 9980 400 00 (email preferred)

sigma star gmbh
Eduard-Bodem-Gasse 6, 1st floor
6020 Innsbruck | Austria

LinkedIn logo
sigma star gmbh logo