Cybersecurity Solutions for Embedded Systems

Timeline
-
May 20, 2025Experience start
-
July 15, 2025Project Demo
-
July 19, 2025Experience end
Timeline
-
May 20, 2025Experience start
-
July 15, 2025Project Demo
Project demonstration followed by a technical report will be required to complete the course INCS 810.
-
July 19, 2025Experience end
Experience scope
Categories
Security (cybersecurity and IT security) Information technology Machine learning Artificial intelligence HardwareSkills
cyber security strategy intrusion detection systems embedded systems vulnerability assessments cyber security technical documentation vulnerability problem solving innovation artificial intelligenceThis experience focuses on equipping learners with fundamental cybersecurity skills and tools, particularly in the context of embedded systems and AI-based solutions. Participants will gain practical knowledge in identifying vulnerabilities, implementing security measures, and developing innovative solutions to protect embedded systems. By applying their classroom knowledge, learners can tackle real-world cybersecurity challenges, enhancing their problem-solving capabilities and technical expertise.
Students
- Comprehensive vulnerability assessment report for an embedded system
- Prototype of an AI-based intrusion detection system, anomaly detection system
- Implementation of security protocols for a specific embedded device
- Technical documentation outlining cybersecurity solutions
- Presentation of cybersecurity strategies and solutions to stakeholders
Project timeline
-
May 20, 2025Experience start
-
July 15, 2025Project Demo
-
July 19, 2025Experience end
Timeline
-
May 20, 2025Experience start
-
July 15, 2025Project Demo
Project demonstration followed by a technical report will be required to complete the course INCS 810.
-
July 19, 2025Experience end
Project Examples
Requirements
- Developing a security framework for IoT devices used in smart homes
- Creating an AI-driven anomaly detection system for industrial control systems
- Designing a secure communication protocol for automotive embedded systems
- Evaluating and enhancing the security of a wearable health monitoring device
- Implementing encryption techniques for data transmission in embedded systems
- Conducting a security audit of a consumer electronics product
- Developing a risk management plan for an embedded system in a healthcare setting
- Designing a secure boot process for an embedded operating system
Additional company criteria
Companies must answer the following questions to submit a match request to this experience:
Additional company criteria
Companies must answer the following questions to submit a match request to this experience:
Timeline
-
May 20, 2025Experience start
-
July 15, 2025Project Demo
-
July 19, 2025Experience end
Timeline
-
May 20, 2025Experience start
-
July 15, 2025Project Demo
Project demonstration followed by a technical report will be required to complete the course INCS 810.
-
July 19, 2025Experience end