Lesson 1 - Preview: Automotive Cybersecurity Boot Camp
What will this Boot Camp cover? Get a quick overview of what you’ll learn from Mike Hodge - your host for this event.
View Course
Learn the threats automakers are up against, why regulators and standards bodies are getting involved, and how an automated approach to cybersecurity testing protects the people behind the wheel.
What will this Boot Camp cover? Get a quick overview of what you’ll learn from Mike Hodge - your host for this event.
View Course
What happens if a car gets hacked? Dick Ludwig, a Business Development Manager with Keysight, explains the many ways in which vehicles are vulnerable to cyberattacks - and what can happen when attacke
View Course
Connected cars are vulnerable to a multitude of potential attack vectors - including many beyond the vehicle itself. Scott Register, Keysight’s VP of Security Solutions, has more.
View Course
You've probably heard about standards like ISO / SAE 21434 and regulations like UNECE WP.29 and UN R155. But what do they mean - and what kind of practical impact do they have on automakers?
View Course
Now that you understand the kinds of threats vehicles are up against, let’s talk about how you can mitigate cybersecurity threats, in accordance with recent standards and regulations.
View Course
Regulations like UN R155 require manufacturers to execute verification and validation tests on cybersecurity-related threats. But how does that work in practice? Join Thomas Leifert, Keysight’s Busine
View Course
Dick Ludwig explains how testing fits into a cybersecurity management system, as described by ISO / SAE 21434.
View Course
View Course
Thomas Leifert explains how cybersecurity verification and validation testing works - and how it integrates into real-world workflows based on regulations like UN R155.
View Course
Protocol fuzzing is an important part of any automotive cybersecurity test plan - especially when it comes to finding upstream vulnerabilities in the supply chain. But how does a protocol fuzzing...
View Course
Watch our partners at Block Harbor Cybersecurity take control of a vehicle’s headlight system using Keysight’s SA8710A Automotive Cybersecurity Penetration Test Platform.
View Course
You might think that automotive cybersecurity is confined to the vehicle, but that’s just the tip of the iceberg.
View Course
As cars get more connected, the line between vehicular cybersecurity and traditional network security is not as well-defined as it once was. What does that mean - and how can you adapt?
View Course
What kinds of vehicular mischief and mayhem can cybercriminals cause if they breach an automaker’s back-end network?
View Course
When it comes to network security, your best defense is to think like the enemy. By safely simulating attacks on your live network, you can pinpoint and fix vulnerabilities before cybercriminals...
View Course
Information security teams are inundated by alerts from their security information and event management (SIEM) tools. However, most of those alarms aren’t actionable - and waste your team’s...
View Course
Discover the value of application and threat intelligence, and why it’s so important to have both feeding into your automotive cybersecurity and network security tools.
View Course
With an integrated, automated, and intelligent approach to automotive cybersecurity, you can rest assured knowing your systems are shielded, your vehicles are secure, and your passengers are safe.
View Course
https://learn.keysight.com/i/1489516-automotive-cybersecurity-solutions-for-iso-sae-21434-unece-wp-29
View Course
Introduction to IoT Testing
Next CourseMike Hodge explores how new automotive cybersecurity standards and regulations will impact automakers.
View Course