Introduction to Embedded Linux Security

Introduction to Embedded Linux Security

Linux Foundation via YouTube Direct link

HOW DOES IT WORK?

9 of 37

9 of 37

HOW DOES IT WORK?

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Introduction to Embedded Linux Security

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Embedded Linux Conference North America 2020
  2. 2 INTRODUCTION TO SECURITY
  3. 3 SECURITY CONCEPTS III
  4. 4 THREAT MODELING
  5. 5 STRIDE
  6. 6 DREAD
  7. 7 THREAT MODEL EXAMPLE
  8. 8 SECURE BOOT CONCEPTS
  9. 9 HOW DOES IT WORK?
  10. 10 SECURE BOOT ON i.MX6
  11. 11 CODE AND DATA ENCRYPTION
  12. 12 SECURE BOOT WITH ENCRYPTION
  13. 13 WHERE IS THE KEY?
  14. 14 PRIVATE KEY STORAGE
  15. 15 KEY STORAGE ON .MX PROCESSORS
  16. 16 KEY STORAGE ON EXTERNAL DEVICES
  17. 17 SECURE ELEMENT
  18. 18 SECURE CODING
  19. 19 STATIC CODE ANALYSIS
  20. 20 RUNTIME PROTECTIONS
  21. 21 FUZZING TOOLS
  22. 22 PERMISSIONS
  23. 23 ACCESS CONTROL
  24. 24 LINUX CAPABILITIES
  25. 25 DAC vs MAC
  26. 26 LINUX SECURITY MODULES
  27. 27 APPLICATION SANDBOXING
  28. 28 LINUX CONTAINERS
  29. 29 CONTAINERS AND SECURITY
  30. 30 TEE IMPLEMENTATION
  31. 31 UPDATE SYSTEM AND SECURITY
  32. 32 UPDATE CHALLENGES
  33. 33 UPDATE STRATEGIES
  34. 34 NETWORK SECURITY
  35. 35 DEFENSE IN DEPTH!
  36. 36 SECURITY GENERAL RULES
  37. 37 DESIGN FOR SECURITY

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.