Embedded Systems Security Red Team (IoT)

The primary audience for this training includes system architects, software developers, chip and hardware designers or product managers who are upgrading their product with security features. The training is also relevant for the security analyst with a software background who is interested in building their knowledge base about the security features of the system, where his code is running.