GRIMM builds and instructs off-the-shelf training courses that explore how to think like an attacker -- how an attacker might target and exploit an organization’s systems, networks, or devices. Courses are "hands-on" and made for developers, engineers, penetration testers, forensic investigators, vulnerability researchers, security auditors, and general IT professionals.
GRIMM also develops custom courseware. Recently, a commercial Internet of Things (IoT) vendor asked GRIMM to build a course to better train their IT workforce in understanding how the attackers think and what techniques they employ against that vendor’s specific technology.
During this 5-day course, participants gain an understanding of the automotive cybersecurity threat-landscape from an attackers perspective. Automotive attack surfaces are highlighted, with a focus on attack techniques -- providing insight into creating defensible designs. Attendees benefit from hands-on offensive exercises in a lab environment. These exercises are designed to ensure each student comprehends real-world exploitation, enhancing the ability to integrate defensive security measures into their vehicle networks.
“Automotive cybersecurity is still a fairly new concept, and has a steep learning curve whether you have a background in IT, automotive product development or any other technical field. Looking for a training that could help me get up to speed with certain automotive security methodologies, I decided to attend the GRIMM Defensive Automotive Engineering Security training and am happy I did. Not only did this training provide clarity on the security implications of common technologies found in vehicles, it also provided a hands-on experience exploiting some of these security flaws. The instructors (Aaron, Matt, Mitch and Tim) did an excellent job explaining the concepts, guiding us through the labs and using the real-life automotive lab they let us play with. They also did a great job promoting a laid-back learning environment that resulted in engaging discussions and information-sharing among the attendees. Overall, I would highly recommended this training for any individual in the automotive industry looking to get more familiar with the automotive hacking space.” Tyler H., Product Cybersecurity Specialist
Contact us. A GRIMM representative will reach out as soon as possible.