TorBT - Torrents and Magnet Links Search Engine
[ WebToolTip.com ] Udemy - Designing Secure Embedded System - From Threats to Protection
- Date: 2026-04-06
- Size: 1.8 GB
- Files: 52
File Name
Size
Get Bonus Downloads Here.url
180 B
~Get Your Files Here !/1 - Core Security Principles for Embedded Systems/1. Section Intro.html
7.3 kB
~Get Your Files Here !/1 - Core Security Principles for Embedded Systems/1. Threat Landscape for Embedded Devices.html
18 kB
~Get Your Files Here !/1 - Core Security Principles for Embedded Systems/2. Cryptographic Building Blocks.html
18 kB
~Get Your Files Here !/1 - Core Security Principles for Embedded Systems/2. What This Course Covers and How It Works.en_US.srt
3.9 kB
~Get Your Files Here !/1 - Core Security Principles for Embedded Systems/2. What This Course Covers and How It Works.mp4
50 MB
~Get Your Files Here !/1 - Core Security Principles for Embedded Systems/3. Threat Landscape for Embedded Devices.en_US.srt
13 kB
~Get Your Files Here !/1 - Core Security Principles for Embedded Systems/3. Threat Landscape for Embedded Devices.mp4
148 MB
~Get Your Files Here !/1 - Core Security Principles for Embedded Systems/4. Cryptographic Building Blocks for Device Protection.en_US.srt
13 kB
~Get Your Files Here !/1 - Core Security Principles for Embedded Systems/4. Cryptographic Building Blocks for Device Protection.mp4
146 MB
~Get Your Files Here !/1 - Core Security Principles for Embedded Systems/5. Section Summary.html
6.1 kB
~Get Your Files Here !/1 - Core Security Principles for Embedded Systems/6. Reading Material.html
7.3 kB
~Get Your Files Here !/2 - Secure Startup-Establishing Trust at the Hardware Level/1. Embedded Security Foundations Assessment (Description).html
900 B
~Get Your Files Here !/2 - Secure Startup-Establishing Trust at the Hardware Level/1. Embedded Security Foundations Assessment.html
78 kB
~Get Your Files Here !/2 - Secure Startup-Establishing Trust at the Hardware Level/10. Section Summary.html
6.1 kB
~Get Your Files Here !/2 - Secure Startup-Establishing Trust at the Hardware Level/11. Reading Material.html
7.0 kB
~Get Your Files Here !/2 - Secure Startup-Establishing Trust at the Hardware Level/3. Secure Boot Fundamentals.html
18 kB
~Get Your Files Here !/2 - Secure Startup-Establishing Trust at the Hardware Level/4. Hardware Security Modules.html
18 kB
~Get Your Files Here !/2 - Secure Startup-Establishing Trust at the Hardware Level/7. Section Intro.html
7.1 kB
~Get Your Files Here !/2 - Secure Startup-Establishing Trust at the Hardware Level/8. Secure Boot Fundamentals.en_US.srt
11 kB
~Get Your Files Here !/2 - Secure Startup-Establishing Trust at the Hardware Level/8. Secure Boot Fundamentals.mp4
128 MB
~Get Your Files Here !/2 - Secure Startup-Establishing Trust at the Hardware Level/9. Inside Hardware Security Modules.en_US.srt
12 kB
~Get Your Files Here !/2 - Secure Startup-Establishing Trust at the Hardware Level/9. Inside Hardware Security Modules.mp4
123 MB
~Get Your Files Here !/3 - Securing Firmware Against Modern Attack Vectors/12. Section Intro.html
7.1 kB
~Get Your Files Here !/3 - Securing Firmware Against Modern Attack Vectors/13. How Side-Channel Attacks Work.en_US.srt
12 kB
~Get Your Files Here !/3 - Securing Firmware Against Modern Attack Vectors/13. How Side-Channel Attacks Work.mp4
139 MB
~Get Your Files Here !/3 - Securing Firmware Against Modern Attack Vectors/14. Secure Firmware Update Mechanisms.en_US.srt
10 kB
~Get Your Files Here !/3 - Securing Firmware Against Modern Attack Vectors/14. Secure Firmware Update Mechanisms.mp4
112 MB
~Get Your Files Here !/3 - Securing Firmware Against Modern Attack Vectors/15. Section Summary.html
6.0 kB
~Get Your Files Here !/3 - Securing Firmware Against Modern Attack Vectors/16. Reading Material.html
7.1 kB
~Get Your Files Here !/3 - Securing Firmware Against Modern Attack Vectors/5. Side-Channel Attacks.html
18 kB
~Get Your Files Here !/3 - Securing Firmware Against Modern Attack Vectors/6. Secure Firmware Updates.html
18 kB
~Get Your Files Here !/4 - Creating Secure Channels and Robust Codebases/17. Section Intro.html
7.1 kB
~Get Your Files Here !/4 - Creating Secure Channels and Robust Codebases/18. Communication Security for Embedded Systems.en_US.srt
11 kB
~Get Your Files Here !/4 - Creating Secure Channels and Robust Codebases/18. Communication Security for Embedded Systems.mp4
127 MB
~Get Your Files Here !/4 - Creating Secure Channels and Robust Codebases/19. Coding Standards That Prevent Attacks.en_US.srt
10 kB
~Get Your Files Here !/4 - Creating Secure Channels and Robust Codebases/19. Coding Standards That Prevent Attacks.mp4
128 MB
~Get Your Files Here !/4 - Creating Secure Channels and Robust Codebases/20. Section Summary.html
6.0 kB
~Get Your Files Here !/4 - Creating Secure Channels and Robust Codebases/21. Reading Material.html
7.0 kB
~Get Your Files Here !/4 - Creating Secure Channels and Robust Codebases/7. Communication Security.html
18 kB
~Get Your Files Here !/4 - Creating Secure Channels and Robust Codebases/8. Secure Coding Standards.html
18 kB
~Get Your Files Here !/5 - Pathways to Certified Embedded Security/2. Firmware Protection and Certification Readiness Assessment (Description).html
932 B
~Get Your Files Here !/5 - Pathways to Certified Embedded Security/2. Firmware Protection and Certification Readiness Assessment.html
78 kB
~Get Your Files Here !/5 - Pathways to Certified Embedded Security/22. Section Intro.html
6.9 kB
~Get Your Files Here !/5 - Pathways to Certified Embedded Security/23. Meeting Industry Expectations Compliance & Certification.en_US.srt
11 kB
~Get Your Files Here !/5 - Pathways to Certified Embedded Security/23. Meeting Industry Expectations Compliance & Certification.mp4
135 MB
~Get Your Files Here !/5 - Pathways to Certified Embedded Security/24. Section Summary.html
6.0 kB
~Get Your Files Here !/5 - Pathways to Certified Embedded Security/25. Reading Material.html
7.2 kB
~Get Your Files Here !/5 - Pathways to Certified Embedded Security/9. Compliance & Certification.html
18 kB
~Get Your Files Here !/6 - Course Wrap-Up/26. Bonus Lecture.en_US.srt
54 kB
~Get Your Files Here !/6 - Course Wrap-Up/26. Bonus Lecture.mp4
630 MB
~Get Your Files Here !/Bonus Resources.txt
70 B