Go to Main Content

Georgia Tech

 

HELP | EXIT

Detailed Course Information

 

Fall 2024
Nov 12, 2024
Transparent Image
Information Click the Schedule Type to find available offerings of the course on the Schedule of Classes.

DEF 4604S - Cyber Exploitation/Embeded Sys
Embedded systems offer many opportunities to economically and effectively control large infrastructure systems, small single purpose devices, and many products in between. But their use can also introduce vulnerabilities easily exploited to gain access to valuable data, alter device functionality, or impose other risks. Understand those unique vulnerabilities in embedded systems that are commonly exploited. Discover techniques and strategies for designing cyber security measures into products from the start. Through hands-on labs, examine emerging threats and learn to think like a “hacker” to gain the skills necessary to create more secure products. Focus on methodologies for assessing risk, integrating defensive tools for mitigating risk, and addressing future vulnerabilities throughout the product life cycle. Finally, discover best practices to integrate into your design processes to raise your level of product security.
1.750 Continuing Education Units
17.500 Lecture hours

Syllabus Available
Grade Basis: Z
GTRI CIPHER Division
Professional Education Department

Course Attributes:
Cybersecurity: E, PE Contract Course Only

Return to Previous New Search
Transparent Image
Skip to top of page
Release: 8.7.2.4GT