Automotive Cyber Security CPD | Coventry Universit...
CLOSE

Campus Map

Working with Coventry University

Working at Coventry University

Coventry University is a diverse and exciting place to work and we share the enthusiasm of our staff and students to be the best at whatever they choose to do. As one of the City’s biggest employers, we offer some impressive benefits for our staff and are committed to delivering the very best opportunities. We have a comprehensive training, personal and professional development programme that provides our employees with the skills to enhance their performance in the workplace and grow in their careers. There are pension schemes, a generous holiday allowance and flexible working opportunities as well as lifestyle benefits including childcare vouchers, discounted membership to the £4 million sports and recreation centre and schemes such as Cycle to Work and the CU Car Share initiative.

View current job vacancies.

LOG IN TO THE COVENTRY UNIVERSITY SITE

Staff portal

Access the central point of information for all staff across the University.

LOG IN TO THE STAFF PORTAL

Student Portal

Check your assessments, access Solar and get course information.

LOG IN TO THE STUDENT PORTAL
Automotive Cyber Security

Automotive Cyber Security

Automotive cybersecurity provides a major challenge to connected and autonomous vehicles. This course addresses the wider challenges of increasing digital and software components on connected platforms and focusses specifically on threat intelligence and engineering aspects of automotive systems. Issues of policy and personal data are also explored.

Cyber security for the automotive industry (Beginners)

(code: CYS1D1718)

Course summary:

Details:

  • Introduction to modern automotive
  • Vehicular developments: Connectivity and autonomy
  •  Advances in communication and sensing technologies
  • Recent high-profile attacks
  • Security threat analysis
  • Attack surfaces for connected platforms
  • Systematic threat mapping and hacker motivations
  • Over-The-Air (OTA) updates

Who should attend?:

Engineers, scientists and consultants with an interest in the cybersecurity of connected and autonomous vehicles. Automotive manufactures, electronics designers and suppliers, components manufacturers and software tool developers. Policy makers, academics and researchers.

Duration: 1 day

 

Register your interest

Cyber security for the automotive industry (Intermediate)

(code: CYS2D1718)

Course summary:

Details:

  • Systems security assurance
  • High-integrity software design and testing
  • Design and testing trade-offs
  • Safety and security: ISO26262 and J3061 standards
  • Liabilities and privacy challenges
  • Privacy issues for connected cars
  • Automotive supply chain and liabilities
  • Stanley’s Class Action lawsuit

Who should attend?:

Engineers, scientists and consultants with an interest in cybersecurity of connected and autonomous vehicles.  Automotive manufactures, electronics designers and suppliers, components manufacturers and software tool developers. Policy makers, academics and researchers.

Duration: 2 days

 

Register your interest

Cyber security fundamentals

(code: CSF5D1718)

Course summary:

This course will focus on underlying theory of security issues and legislation. It aligns with cyber-essentials “10 steps” and ends with CIS F (ISO27001) certification. The underlying theory is demonstrated through practical applications in order to develop understanding of security that goes beyond following set rules and helps to ensure people working with IT are safe from new and unexpected threats. It will also introduce how legislation is analysed in a personal and corporate context in order to develop a delegates understanding of their responsibilities when working with data.

 

Details:

  • Rights and responsibilities
  • Current UK and international law on cybersecurity
  • data protection
  • Users, accounts, servers, services
  • Components of connected systems
  • Firewalls.• Phishing and social engineering
  • Information available to attackers - personal, technological, etc
  • Cryptography
  • PSK in practice and PKC in theory
  • Hashes and Passwords. Salt. Brute force (through UI/web) versus other hash breaking methods
  • XSS and SQL injection
  • Sessions and session hijacking
  • Wifi vulnerabilities
  • Malware, privilege escalation, botnets, ransomware, removable media controls
  • Monitoring and incident response
  • Certified Information Security Management Systems Foundation and much more.

Who should attend?:

This course is intended anyone working at an intermediary level within IT.

Duration: 5 days

 

Register your interest