Better systems engineering through cybersecurity expertise

Integrate cybersecurity into work practices to develop future-proof and robust systems

In systems engineering, the correct consideration of cybersecurity is not optional, but a necessity. The increasing connectivity and complexity of systems makes it essential to integrate cybersecurity requirements into existing architecture models, hardware-software interfaces and systems. This integration creates new challenges, but also opens up opportunities for optimization in systems engineering.

Learn about the impact of cybersecurity in the automotive industry as a Systems Engineer, and get to know the tools to deliver and validate solutions ensuring the correct implementation of the cybersecurity standards in conjunction with all other aspects of product development. Now you will find all learning content of the live training available as a video course series.

Advantages at a glance:

  • Enhanced competencies in work product design: The inclusion of cybersecurity aspects in the item definition and interface design increases the quality and security of the developed systems. This ultimately increases satisfaction with the results achieved.
  • Consideration of security aspects when reusing components: Intelligent procedures for the reuse of work products and components as well as for the integration of systems help to ensure adequate security of the end product.
  • Optimizing system performance from a security perspective: The integration of cybersecurity features, such as encryption, can affect system performance. Taking these aspects into account at an early stage in the design process makes it possible to avoid the need for costly corrections in advance.
  • Exploiting synergies between functional safety and cybersecurity: The similarities between functional security and cybersecurity offer potential for synergies that can be leveraged for an efficient and effective security strategy.
  • Cybersecurity in threat analysis and risk assessments: Existing threat analysis and risk assessment methods can be adapted to new cybersecurity requirements to ensure a holistic and up-to-date security perspective.

Learning objectives of the entire video course
What will you be able to do after completing this video learning course?

  • Comprehend the impact of automotive hacks in and between all product lifecycle phases.
  • Differentiate between legal regulations and standards like UN R155 and ISO/SAE21434.
  • Identify potential enablers and inhibitors of cybersecurity.
  • Be able to sketch the elements of cybersecurity development like concepts, goals, and claims.
  • Be sure you can follow the main steps of risk assessment.
  • Reflect the challenges of cybersecurity planning especially during distributed development.
  • Describe the needs of cybersecurity verification and validation incl. fuzz and pen testing.

Content of the On-Demand Video learning bundle for System Engineer (Total length: +8 hours)

This video course series consists of 48 single videos, according to the following listing (sorted by chapters)

By accessing this All-access bundle, you will then find a learning video (in English) for each topic listed below in your personal login area. Each individual learning video has a length of approx. 10 minutes. Please note: Downloading the learning videos is not possible for licensing reasons.

• Cybersecurity terms and definitions
• Automotive hacks


• Overview ISO/SAE 21434
• Regulations and standards apart ISO/SAE 21434

• UN Regulation No. 155 (CSMS + Type Approval)

• Vehicle ecosystem and challenges in V2X
• Impact of Cybersecurity on Product lifecycle


• Cybersecurity culture

Stakeholder and communication
• Cybersecurity Audit and Assessment
• Cybersecurity Management - Project level
• Impact of Cybersecurity on Project lifecycle
• Cybersecurity Planning
• Cybersecurity Plan
• Cybersecurity Case

Overview Product Security Incident Response Team (PSIRT)
• Vulnerability Analysis
Cybersecurity requirements for post-development

• Cybersecurity Development
• Development Overview and cybersecurity relevance
• Item definition
• Threat analysis and risk assessment (TARA)
• Cybersecurity Concept
• Cybersecurity Product development

Refined cybersecurity specification (system)
• Cybersecurity Best practices
• Cybersecurity Validation

• Cybersecurity Risk Assessment

• Threat Analysis
• Impact Assessment

• Asset identification
• Attack path & Feasibility analysis
• Risk determination and treatment

Cybersecurity in HW implementation (e.g. hardware security module=HSM)
Cybersecurity SW Development Measures
Cybersecurity Control Implementation - Development vs Maintenance Phase
Cybersecurity in AUTOSAR
SW Quality
Coding Guidelines, rules and standards
Re-Use-and out-of-context
Cybersecurity impact analysis - concept/reuse analysis

Introduction to Cybersecurity Controls
Automotive cybersecurity controls
In-vehicle cybersecurity controls: Overview and Cryptography
In-vehicle cybersecurity controls: Access control, secure on/off-board communication, network segmentation and isolation
In-vehicle cybersecurity controls: Trusted environment, system resilience, monitoring and logging

• Cybersecurity verification and validation strategy
• Introduction to Cybersecurity test methods

Course plan

Intro to your ODV video learning course 🥉 CySec for Systems Engineering
📄 Chapter 01: Awareness
📄 Chapter 02: Automotive Cybersecurity Standards
📄 Chapter 03: Cybersecurity in Automotive Industry
📄 Chapter 04: Cybersecurity Management Courses
📄 Chapter 05: Cybersecurity Development
📄 Chapter 06: Risk Assessment
📄 Chapter 07: Cybersecurity Implementation
📄 Chapter 08: Cybersecurity controls
📄 Chapter 09: Cybersecurity Testing and Validation
Certificate of Attendance (CoA) Systems Engineering