This five-day course will enable you to understand the operation and vulnerabilities of communications and network systems within future connected vehicles.
On successful completion of this module you will be able to:
- Analyse and evaluate the network components of vehicle system architectures and the methods used to secure them.
- Appraise and rate cyber vulnerabilities and how these impact on the security and/or safety of connected vehicles.
- Analyse the networks of a notional connected vehicle, rate potential attacks and judge most appropriate mitigations.
At a glance
-
- Dates
-
- Please enquire for course dates
- DurationFive days
- LocationCranfield campus
- Cost£1,940 Concessions available
Course structure
The course will be delivered as lectures in the morning and hands-on or tutorial activities in the afternoon. All delegates will receive a Certificate of Attendance at the end of the course.
What you will learn
- Analyse and evaluate the network components of vehicle system architectures and the methods used to secure them.
- Appraise and rate cyber vulnerabilities and how these impact on the security and/or safety of connected vehicles.
- Analyse the networks of a notional connected vehicle, rate potential attacks and judge most appropriate mitigations.
Core content
- History of cyber against connected vehicles, e.g. examples of hacks (e.g. Jeep Cherokee)
- Network principles, e.g. protocols, addressing, reliable communications (including time sensitive/critical i.e. databus principles, error detection/correction), routing, physical layer (e.g. rf range)
- Vehicle databuses and information architectures, e.g CANBus
- Security engineering, e.g. CIA, encryption, vulnerabilities, exploits, patching, reverse engineering
- Principles of vehicle systems/security
- Typical systems and how they are connected
- Typical vulnerabilities in connected vehicle systems, e.g. attack surfaces, tools and techniques, example vulnerabilities and exploits (same examples as the start but in greater depth, plus any current at time of module delivery)
- Demonstration - Hacking the Keeloq
- Discussion - “Just another computer?” (how IT cybersecurity practices may be applied to vehicle cybersecurity)
Solutions, advances and future technologies e.g. MilCAN, automotive Ethernet
You will be to complete approximately 20 hours of pre-work before the start of the teaching week. This can include pre-reading, using the "essential reading" list as a guide. You should also use this time to familiarise yourself with any software tools you feel you will need and to complete any tasks explicitly communicated by the module team.
Who should attend
This course is aimed at control, system, and component engineers working in the automotive industry and related industries, who are interested in developing their understanding of network systems, protocols, and cybersecure architectures.
Speakers
Concessions
20% discount for Cranfield alumni.
10% discount when registering 3 or more delegates from the same organisation at the same time.
Accommodation options and prices
This is a non-residential course. If you would like to book accommodation on campus, please contact Mitchell Hall or Cranfield Management Development Centre directly. Further information regarding our accommodation on campus can be found here.
Alternatively you may wish to make your own arrangements at a nearby hotel.Location and travel
Cranfield University is situated in Bedfordshire close to the border with Buckinghamshire. The University is located almost midway between the towns of Bedford and Milton Keynes and is conveniently situated between junctions 13 and 14 of the M1.
London Luton, Stansted and Heathrow airports are 30, 90 and 90 minutes respectively by car, offering superb connections to and from just about anywhere in the world.
For further location and travel detailsLocation address
Cranfield University
College Rd,
Wharley End,
Bedford
MK43 0AL
How to apply
To apply for this course please use the online application form.
Read our Professional development (CPD) booking conditions.