GRIMM offers off-the-shelf (OTS) courses developed in-house to train hardware and software developers, engineers, penetration testers, forensic investigators, vulnerability researchers, security auditors, and general IT professionals to better understand how an attacker might attack and exploit an organization’s systems, networks, or devices. These courses are “hands-on” so students understand by doing it themselves.
GRIMM's next Defensive Engineering Training (AutoSec) runs February 25 - March 1, 2019
GRIMM develops custom courseware for organizations with unique needs. In the past, GRIMM has developed courseware for commercial Internet of Things (IoT) vendors who are interested in better training their IT workforce to build security into development practices by understanding how the attackers think, and what techniques they employ against that vendor’s specific technology. Typical courseware development can take up to eight weeks to develop.
During this 5-day course, participants will gain an understanding of the automotive cybersecurity threat-landscape from an attackers perspective. Automotive attack surfaces will be highlighted, with a focus on attack techniques to provide insight into creating better defensive designs. In addition to traditional course lectures, the attendee will benefit from hands-on offensive exercises in a lab environment. These exercises will ensure each student cements their new-found comprehension of real-world exploitation. Participants will enhance their abilities to integrate defensive security measures into their vehicle networks.
“Automotive cybersecurity is still a fairly new concept, and has a steep learning curve whether you have a background in IT, automotive product development or any other technical field. Looking for a training that could help me get up to speed with certain automotive security methodologies, I decided to attend the GRIMM Defensive Automotive Engineering Security training and am happy I did. Not only did this training provide clarity on the security implications of common technologies found in vehicles, it also provided a hands-on experience exploiting some of these security flaws. The instructors (Aaron, Matt, Mitch and Tim) did an excellent job explaining the concepts, guiding us through the labs and using the real-life automotive lab they let us play with. They also did a great job promoting a laid-back learning environment that resulted in engaging discussions and information-sharing among the attendees. Overall, I would highly recommended this training for any individual in the automotive industry looking to get more familiar with the automotive hacking space.” Tyler H., Product Cybersecurity Specialist
A GRIMM representative will reach out as soon as possible.