Curriculum
- 8 Sections
- 46 Lessons
- 2 Days
Expand all sectionsCollapse all sections
- Cybersecurity in Modern Vehicles (20% Concepts)6
- 1.1Evolution of the modern vehicle as a cyber-physical system
- 1.2Software-defined vehicles (SDVs), connectivity, OTA, ADAS → expanding attack surface
- 1.3Landscape of cyber threats in automotive (malicious actors, supply chain risks, physical access threats
- 1.4Electric, connected & autonomous vehicle architecture – a cybersecurity viewpoint
- 1.5Overview: ISO/SAE 21434 & UNECE WP.29 requirements
- 1.6Why cybersecurity is now a business risk, not just engineering
- In-Vehicle Networks & Communication Security6
- 2.1Architecture of CAN, LIN, FlexRay, Automotive Ethernet
- 2.2ECU-to-ECU communication & gateway architecture
- 2.3Common vulnerabilities across these networks
- 2.4Vehicle diagnostics (UDS, OBD-II) & risks
- 2.5Emerging ecosystem vulnerabilities: telematics, cloud integration, connected apps
- 2.6Case based learning : Tesla Autopilot hacks; Jeep Cherokee CAN bus compromise; Keyless entry relay attacks
- Threat Modeling for Automotive Systems8
- 3.1Threat modeling principles for automotive systems
- 3.2Applying HEAVENS or STRIDE to a vehicle subsystem
- 3.3Vulnerability mapping – entry points & propagation paths
- 3.4Firmware tampering, ECU cloning, sensor spoofing
- 3.5EV ecosystem risks (BMS, charging stations, telematics cloud)
- 3.6Case Study 1: EV charging infrastructure cyber breach
- 3.7Case Study 2: ADAS LiDAR/Radar spoofing attack
- 3.8Case Study 3: Telematics fleet data leakage
- Hands-On Exercise 13
- Secure Vehicle Engineering & Design Principles6
- Vehicle-Level Cybersecurity Controls7
- 6.1Network segmentation, message authentication, IDS/IPS
- 6.2Real-time anomaly detection for CAN & Ethernet
- 6.3Incident response & cyber-resilience for vehicles
- 6.4Supplier & Tier-1 ecosystem risks
- 6.5EV & battery cyber risks: BMS vulnerabilities; Charging grid hacking; Telemetry manipulation
- 6.6Case Based Example 1: OEM OTA firmware compromise
- 6.7Case Based Example 2: Charging network ransomware attacks
- Security Testing, Validation & Monitoring8
- 7.1Security testing methods: penetration testing, fuzzing, auditing
- 7.2Test plan for ECU cybersecurity
- 7.3Test plan for network & communication protocols
- 7.4Telemetry & cloud backend testing basics
- 7.5Testing real logged attacks (sample datasets provided)
- 7.6Case Study 4: ECU firmware fuzz testing outcome
- 7.7Case Study 5: Real OEM penetration test findings
- 7.8Case Study 6: IDS anomaly detection – a case pattern
- Hands-On Activity2