한글자막 지원
5iiRCFhKZ2loT1XqnUFRUb47OpS0gMe2MmSGZW461snodB0IHZ2Suyj7PacZoev+qcJaUh4wW134NEUtZ0XxPCy+0B8Cln4/pW6inHsMjbiOGFLohfpxbFHyy2kim3YaHvMbCqBH45/vFoe+oPyo6/ClAUOtmqurAzkhrLTmkn4=
Mímir, Keeper of the Well of WisdomNFO
Cybersecurity - Automotive
https://www.udemy.com/course/automotive-cybersecurity-handbook/
Year : 2025
Language : English
Level : All Levels
Category : IT & Software
Subcategory : Network & Security
Duration : 8h 6m
Lectures : 93
Rating : 4.5/5 (2,123 reviews)
Students : 9,559
INSTRUCTOR(S)
HEADLINE
AES -128,AUTOSAR Crypto stack,ISO21434,TARA,Cyber Attacks ,
Automotive penetration testing, PKI, IDS, secure flash, boot
WHAT YOU'LL LEARN
* Domain specific automotive cyber attacks
* Need of automotive security
* Brief summary about Automotive cybersecurity standards-
ISO21434 (TARA), UN R155
* TARA Practical report with usecase
* Basic properties of security (CIA)
* Basic terminology of Cryptography
* Symmetric algorithm (AES-128 - CBC, ECB mode)
* Asymmetric algorithm(RSA)
* Advantages and disadvantages of Symmetric and asymmetric
algorithm
* Achieving Security through SW and HW solution in automotive
* Overview of security related components in ECU
* Automotive trust Anchors (SHE, HSM)
* Detailed Difference between SHE and HSM ( Only by
Experience)
* Key management (Key storage in Secure slot)
* Diffie Hellman (DH) key exchange algorithm
* AUTOSAR Crypto stack (CSM, Secure on board communication
(Secoc), Cry, CryIf, Crypto)
* Interaction between AUTOSAR Crypto models ( User friendly
animations)
* What is the need of freshness value?
* Demonstration of Freshness value
* What happens if MAC verification fails
* Secure Boot - Why ? what ? How ?
* Types of Cyber Attacks - Sniffing , Injection, Denial of
service , Fuzzing, Replay attacks
* Tesla hacked - Proof
* Automotive penetration testing
* Secure boot, Secure Flash
* Intrusion detection system (IDS), IDS-R(Reporter), IDS -M
(Manager)
* VSOC(Vehicle Security operation center)
REQUIREMENTS
* Nothing is required, depth concepts are explained in easily
understandable Animations.
* No programming experience needed
WHO IS THIS COURSE FOR
* Automotive enthusiast, Automotive embedded professionals
* Who wants to switch or start their career in Automotive
cybersecurity domain to become a automotive cyber security
engineer or manager
DESCRIPTION
Today, cybersecurity affects each one of us on a multitude of
levels. Our professional work, our personal lives?even our
vehicles?depend on connectivity and technology that runs on
complex software. Today in the Automotive autonomous driving,
connected cars, electric vehicles, and shared mobility?have
dominated the agenda of automotive industry leaders in recent
years. These innovations, built on the digitization of in-car
systems, the extension of car IT systems into the back end,
the propagation of software, turn modern cars into information
clearinghouses while also making them tempting targets for
cyberattacks, Lets have a short look about interesting
information of last 4 years The frequency of cyberattacks on
cars increased 225 percent from 2018 to 2021 Nearly 85% of
attacks in 2021 were carried out remotely, outnumbering
physical
attacks four to one. 40% of attacks targeted back-end servers.
2021 saw 54.1% of attacks carried out by Malicious actors, up
from 49.3% in 2020 The top attack categories were data/privacy
breach (38%), car theft/break-ins (27%), and control systems
(20%). Keyless entry and key fob attacks account for 50% of
vehicle thefts. Thieves only need to be close to the key fob
a Black Hat hacker to pick up and reproduce its signal. In
very
few years Cybersecurity will raise as a mandatory element in
Automotive and this course will be helpful understanding the
overall view about Cyber security concepts.
COURSE CONTENT
Chapter 1: Introduction
1. Cybersecurity of Automotive - Introduction
2. What is "Cybersecurity'" & What is "Automotive Cyber
Security"
3. Cyber attacks and Attack Vectors : A Trend
4. What you wanted to be in Automotive Cybersecurity?
5. Automotive cybersecurity standards - A walkthrough
Chapter 2: Basic properties of security- CIA
6. Confidentiality, Integrity, Availability
Chapter 3: STRIDE
7. STRIDE
Chapter 4: Hashing
8. Hashing and Encryption, Decryption
Chapter 5: Cryptography and its types
9. Cryptography- Introduction
10. Basic terminologies of Cryptography
11. Cryptography : Types
12. Symmetric Algorithm and with example AES-128 ( CBC and
ECB )
13. Asymmetric algorithm (RSA)
14. Advantages of Symmetric and Asymmetric algorithm
15. Hashing - Summary
Chapter 6: Digital signature and verification
16. Digital Signature generation and verification
Chapter 7: Cryptography Practical session
17. Demo - Web based tools for cryptography
18. Demo - OpenSSL AES Encryption,Hashing
19. Demo - OpenSSL RSA
Chapter 8: PKI
20. What is PKI
21. What is Digital Certificate and CA
22. How Digital Certificate is Produced
23. Basics Functionalities of CA
Chapter 9: Achieving security mechanism in HW (SHE , HSM) and
24. Achieving Security Mechanism in HW and SW
25. Overview of security components in ECU
26. Difference between SHE and HSM
Chapter 10: TRNG (True Random Number Generator) and PRNG
(Pseudo Random Number Generator)
27. Why Randomness, Difference between TRNG and PRNG ,
Combination of it
Chapter 11: Key management and Key exchange algorithm
28. Key Management in SHE
29. Loading keys in Secure slot - SHE
30. Calculation of M1 to M5 in SHE
31. M1 to M5 between Host and ECU
32. Types of Key Injection methods
33. Key Exchange Algorithm- Diffie Hellman Algorithm
34. SHE and HSM - Key Management in Core
Chapter 12: AUTOSAR , AUTOSAR Crypto stack( SecOC, CSM,
CRY,CRYIF)
35. Overview AUTOSAR Architecture
36. Overview of AUTOSAR CRYPTO stack
37. CSM, CRY, CRYIF
Chapter 13: CyberSecurity - Layer Level
38. Layer level security
Chapter 14: Secure Access Using UDS
39. Secure Access : UDS 27 Service with Server
Chapter 15: Secure on board communication (SecOC)
40. SecOC- Secure Onboard communication
41. What is the need of Freshness value
42. Receiver Verification SecOC
43. Demonstration of Freshness Value
44. What happens if MAC Verification fails
Chapter 16: Secure Boot
45. Why and What is Secure boot (SB)
46. Secure Boot- Symmetric
47. Secure Boot- ASymmetric
48. Modes in Secure Boot
Chapter 17: Secure Flash
49. Secure Flash
Chapter 18: Secure JTAG
50. Secure JTAG
Chapter 19: Secure Log
51. Secure Log feature
Chapter 20: IDS - Intrusion Detection System
52. IDS - Introduction
53. Basics components of IDS
54. Host IDS
55. Network Intrusion Detection System
56. Functions of IDS -M and IDS - R
57. Key differences of Host IDS and Network IDS
58. IDS-M to IDS-R AUTOSAR PROTOCOL
59. IDS-M to IDS-R (IDS AUTOSAR PROTOCOL -Event frame)
60. IDS-M to IDS-R ( IDS AUTOSAR PROTOCOL -Timestamp,
context data, Signature)
61. Introduction to VSOC
Chapter 21: Type of Attacks
62. Types of Automotive attacks - Overview
63. Sniffing/Eavesdrop
64. Injection
65. Replay
66. Denial Of Service
67. Fuzzing
68. DOS vs Fuzzing
69. Impersonation
Chapter 22: ISO 21434
70. ISO_Introduction
71. ISO 21434 overview
72. 5. Organization Cybersecurity
73. 6.Project specific cybersecurity_1
74. 6.Project specific cybersecurity_2
75. 7. Distributed cybersecurity
76. 8. Continual cyber security
77. 9. Concept and Integration
78. 10. Production and post production
79. 11. Cybersecurity Validation
80. 12,13,14_Decommissioning
Chapter 23: UN regulations
81. UN R155 overview and Part A
82. UN R155 - Part B,C.
83. UN R156
Chapter 24: TARA Practical analysis
84. TARA overview
85. TARA practical report with example usecase
Chapter 25: Security Validation- Automotive Penetration
testing
86. Types of Security testing - White Box ,Black Box ,Grey
87. Automotive Penetration Testing - Need
88. Automotive Penetration Testing - Part 1
89. Automotive Penetration Testing - Part 2
Chapter 26: Practical session - Extract critical information
from CAN trace
90. CAN TRACE for the practical session
91. Practical Test - Answer explanation
Chapter 27: Conclusion
92. Conclusion
Chapter 28: Bonus
93. Bonus
DATES
Published : 2022-09-14
Last Updated : 2025-08-30
If you fear the truth, don?t come to my well.
