Paradigm shift in hardware development through cybersecurity

Empowering hardware engineers for future-oriented automotive development

In the world of hardware development within the automotive industry, it is becoming essential for engineers and developers to correctly integrate cybersecurity aspects at every stage of the development process. This begins in early project phases, such as in the selection of design and components, and extends deep into the actual development work. A deep understanding of cybersecurity enables hardware engineers to develop more robust and resilient systems that meet the demands of an increasingly connected and vulnerable automotive world.

Learn about the impact of cybersecurity in the automotive industry as a Hardware Engineer, and get to know the tools to perform the design and integration of the hardware ensuring the cybersecurity regulations in each step of the process (Strategy and environment definition, as well as execution). Now you will find all learning content of the live training available as a video course series.

Advantages at a glance


  • Establishing cybersecurity as a relevant decision criteria: In the early stages of a development project (especially in hardware design decisions!), cybersecurity considerations must be fully defined and applied as a criterion. In this way, developed hardware components are designed with security in mind from the very beginning and any costly changes at a later stage are avoided.
  • Strengthening security awareness: Training and raising awareness of cybersecurity risks and practices strengthens understanding of cybersecurity as a necessity for hardware engineers, leading to more efficient development processes.
  • Proactive cybersecurity: By making the right decisions regarding the selection of hardware components, involved hardware engineers can help ensuring the appropriate consideration of cybersecurity requirements early and proactively, saving time and costs and minimizing the risk of security breaches.
  • Promoting collaboration/cooperation: A common understanding around cybersecurity and the integration of cybersecurity aspects encourages collaboration between HW developers and involved teams, which promotes a holistic secure product development approach.

Learning objectives of the entire video course
What will you be able to do after completing this video learning course?

  • Comprehend the impact of automotive hacks in and between all product lifecycle phases.
  • Differentiate between legal regulations and standards like UN R155 and ISO/SAE21434.
  • Identify potential enablers and inhibitors of cybersecurity.
  • Be able to sketch the elements of cybersecurity development like concepts, goals, and claims.
  • Be sure you can follow the main steps of risk assessment.
  • Reflect the challenges of cybersecurity planning especially during distributed development.
  • Describe the needs of cybersecurity verification and validation incl. fuzz and pen testing.

Content of the ACP Training Library (Total length: +7 hours)


This video course series consists of 40 single videos, according to the following listing (sorted by chapters)

By accessing this All-access bundle, you will then find a learning video (in English) for each topic listed below in your personal login area. Each individual learning video has a length of approx. 10 minutes. Please note: Downloading the learning videos is not possible for licensing reasons.

1. CYBERSECURITY AWARENESS
• Cybersecurity terms and definitions
• Automotive hacks


2. AUTOMOTIVE CYBERSECURITY STANDARDS
• The Difference between Regulations, Standards, and Laws
• Overview ISO/SAE 21434

3. CYBERSECURITY IN AUTOMOTIVE INDUSTRY
• Vehicle ecosystem and challenges in V2X
• Impact of Cybersecurity on Product lifecycle

4. CYBERSECURITY MANAGEMENT
• Cybersecurity Management - Organizational level
• Cybersecurity culture
• Tool Qualification
• Cybersecurity Management - Project level
• Impact of Cybersecurity on Project lifecycle
• Cybersecurity planning
• Supplier selection
• Cybersecurity Plan
• Cybersecurity Interface Agreement
• Cybersecurity Case

Release for post-development report
Overview Product Security Incident Response Team (PSIRT)
Cybersecurity requirements for post-development
• Cybersecurity incident response plan

5. CYBERSECURITY DEVELOPMENT
• Cybersecurity Development
• Development Overview and cybersecurity relevance
• Item definition
• Threat analysis and risk assessment (TARA)
• Cybersecurity Concept
• Cybersecurity Product development

Refined cybersecurity specification (system)
• Cybersecurity Best practices
• Cybersecurity Validation

6. CYBERSECURITY RISK ASSESSMENT
• Cybersecurity Risk Assessment

7. CYBERSECURITY IMPLEMENTATION
Cybersecurity in HW implementation (e.g. hardware security module=HSM)
Re-Use-and out-of-context
Cybersecurity impact analysis - concept/reuse analysis

8. CYBERSECURITY CONTROLS
Introduction to Cybersecurity Controls
Automotive cybersecurity controls
In-vehicle cybersecurity controls: Overview and Cryptography
In-vehicle cybersecurity controls: Access control, secure on/off-board communication, network segmentation and isolation
In-vehicle cybersecurity controls: Trusted environment, system resilience, monitoring and logging

9. CYBERSECURITY TESTING AND VALIDATION
• Cybersecurity verification and validation strategy
• Introduction to Cybersecurity test methods

Course plan

Welcome
Intro to your ODV video learning course 🥉 CySec for Hardware Engineering
📄 Chapter 01: Awareness
📄 Chapter 02: Automotive Cybersecurity Standards
📄 Chapter 03: Cybersecurity in Automotive Industry
📄 Chapter 04: Cybersecurity Management Courses
📄 Chapter 05: Cybersecurity Development
📄 Chapter 06: Risk Assessment
📄 Chapter 07: Cybersecurity Implementation
📄 Chapter 08: Cybersecurity controls
📄 Chapter 09: Cybersecurity Testing and Validation
Certificate of Attendance (CoA) Hardware Engineering
Quiz