Cyber Security Engineering: Basics and processes

Duration: 2 days

Participants: up to 12 people

Location: virtual or in person

Cost: on request

Green cyber security lock symbol on a dark background with numbers and letters.

This training provides a practical overview of cyber security, cryptographic building blocks, and tried-and-tested security engineering processes for building secure systems. Participants apply their knowledge directly in practical exercises. The training is conducted by experienced senior cyber security experts who are actively involved in projects in the fields of medical technology, automotive, and industry.

Objective and training content

After completing the training, participants will have a basic understanding of the cyber security mindset and the most important technical terms. They will be familiar with key cryptographic building blocks and understand the security engineering development process with its typical artifacts.

Training content:

  • Introduction: What does security mean?
    • Definition: Safety vs. security
    • The intelligent attacker
    • Basics, objectives, and terminology
    • The cyber security mindset
    • Definition of security engineering
  • Cryptographic fundamentals
    • Modern encryption methods
    • Key exchange protocols
    • Cryptographic hash functions
    • Message Authentication Codes
    • Digital signatures
    • Management aspects
    • Authentication methods
    • Certificates and public key infrastructures
  • Regulatory & normative environment (adaptable to specific industries)
    • Automotive: UNECE R155, ISO/SAE 21434
    • Rail technology: EU Cyber Resilience Act, EU RED, IEC 62443, TS 50701, Sector Guideline Rail
    • Medical technology: EU Medical Device Regulation, FDA guidelines, IEC 81001-5-1
    • Industry: EU Cyber Resilience Act, EU NIS 2, EU RED, IEC 62443
    • Agricultural machinery & off-highway: EU Cyber Resilience Act, EU NIS 2, EU RED, ISO 24882
    • Aviation: DO 326/356, ED 201–205
  • Security engineering development process
    • Risk analysis
    • Security concept and selection of cryptographic methods
    • Secure implementation and code analysis
    • Penetration tests

The content of the training can be tailored to your project-specific requirements and questions.

Target audience

Prerequisites

Further information

Contact us with any questions or for an individual quote.

Portrait Sabine Hägele

Expertise – Trainings

Sabine Haegele

You may also be interested in these trainings