Gain practical knowledge in securing embedded systems with our Yocto Project-based course. Get live expert guidance, solve real security challenges, and implement solutions you can use from day one.
Limited spots available—secure your spot today:
Next Available Sessions:
Europe: January 20-24, 2025 – online, CET
LEARN BY DOING Solve real security challenges with guided exercises | LIVE GUIDANCE Daily video sessions with instructors & chat support and discussion when you need it | IMMEDIATE RESULTS Apply security-related fixes to your products from day one |
Hands-On Practice. Expert Insights. Peer Learning.
Everything You Need.
So, you’ve done a few courses and read a few tutorials but still don’t feel great about your skills in embedded security. How do you get better?
Think back to your early days in embedded development. Your biggest leaps forward didn’t come from reading books or watching tutorials—they came from hands-on work with experienced mentors guiding your way.
That’s exactly what makes this training different.
Here, you’ll tackle real security challenges in a live environment, with expert instructors by your side. You’ll work on practical assignments that mirror the actual challenges you face in securing your products.
Plus, you’ll join a group of developers who are on the same journey and understand your challenges—you can share breakthroughs, swap solutions, and learn from each other’s “aha!” moments—all while expert instructors guide the way.
This is going to be exciting. So let’s do this!
What Will You Learn?
The goal of this course is to help you leave with the knowledge, skills, and action plan to improve your product from day one. It’s not going to teach you everything under the sun about Embedded Security, but it’ll teach you the most important things you can do to improve your product from day one.
Here’s what you’ll learn:
✅ Know secure system design principles and their practical implications
✅ Use and analyze CVEs and SBOMs
✅ Set up permissions
✅ Audit your system image
✅ Build your own distribution, with security best practices
✅ Harden a Linux system
✅ Run services as users
✅ Choose packages with security in mind
Is This Course Right For You?
This training is perfect for embedded developers, system architects, and project managers who want to transform. To make sure you’ll get the most value from this course, let’s have a look at what you’ll need:
Required Experience
Yocto Project Basics
- Building and customizing images
- Working with .bbappend files to modify recipes
- Running images using QEMU
- Basic layer management
Basic Unix/Linux Skills
- Perform basic file operations (modify, copy, move)
- Access remote systems using SSH
- Handle basic system troubleshooting
- Navigate the command line efficiently
Programming Basics
- Python (recommended)
- Shell scripting
- Other YP-supported languages
Required Equipment:
- A computer with Internet access allowing SSH and video conferencing (Jitsi)
- A camera (recommended) and a microphone for video conferences
Accessibility & Support:
We believe everyone should have the opportunity to join our course. If you have any disabilities or need special accommodations, please contact us before registration to discuss possible adaption of the course.
How The Course Works
- 100% Online
The whole course runs online through SSH access. You can learn from home, office, or anywhere with the internet. Just log in and you’re ready to go.
- Your Dedicated Virtual Machine
We provide you with a dedicated remote virtual machine that’s yours throughout the course, so you’ll have a consistent, reliable workspace where your progress is saved and accessible 24/7.
- Get Started Immediately
Skip the tedious setup process. Your environment comes pre-configured with all the tools, software, and resources you’ll need. The moment you log in, you’re ready to start learning and practicing.
- Live Expert-Led Sessions
Join video calls 2 times each day where your instructor walks you through new topics. We’ll show you exactly how things work and share tips from our experience.
- Daily Live Q&A Sessions
Got stuck? Need help? Every day we’ll do a live Q&A session where you can ask any of your burning questions. We’re here to make sure you understand everything clearly.
- Project-Based Approach
You’ll work on real exercises, not just read or watch videos. Then you’ll practice what you learn right away so it really sticks and gives you confidence to immediately use it in your project.
- Support & Discussion Channels
Use our chat channels to talk with your teachers and other students. Share ideas, ask questions, or help others out. It’s like having a whole team supporting you as you learn.
Course Schedule
Day 1: We’ll start the course by building your own custom image. You’ll learn how to configure specific image features, create your distribution, and set up security features from scratch. We’ll end the day by running Lynis to check your system’s security baseline and understand what it flags.
Day 2: The next day focuses on security maintenance. You’ll scan your distribution for CVEs, implement fixes, and learn how to handle security patches efficiently. We’ll also cover the critical process of updating distributions between LTS releases without breaking existing security measures.
Day 3: Next, we’ll show you how to generate an SBOM and find information inside. You’ll learn to parse and query SBOM data to track dependencies and potential vulnerabilities. Then we’ll strengthen your build process by tweaking compiler security flags for better protection.
Day 4: This day focuses on hardening the Linux kernel and the whole system. You’ll learn how to set up proper device permissions and make your services more secure by running them with limited privileges. These changes will help protect against common attacks.
Day 5: Finally, on the last day, we’ll wrap it up with practical security decisions. You’ll learn to choose the right packages for security, debug, and production builds, and test your system’s security using Kali Linux. We’ll end the course by looking at upcoming security regulations you need to know about.
Final Quiz: At the end of day 5, you’ll have a chance to test your new skills with our certification quiz. Get at least 60% right and you’ll walk away with a certificate that shows you know how to build secure embedded systems, something that’ll definitely catch the eye of employers and clients.
Limited spots available—secure your spot today:
Next Available Sessions:
Europe: January 20-24, 2025 – online, CET
Get Your Certificate Of Completion Complete the course requirements and prove your expertise: – Pass the final assessment with 60% or higher – Submit 90% of course exercises with passing grades – Get your certificate to showcase your new skills |
Take The Next Step To Better Secure Your Products
With rising IoT threats and tougher regulations with the CRA (Cyber Resilience Act), the question isn’t if you need these skills—it’s how soon you can get them. Each session fills up quickly as companies prioritize security training for their embedded teams. So don’t miss out!
Language: Training materials are in English. The course can be delivered in English, French, and Polish.
Your Investment: 950€ (Or $1,020) without taxes
The price shown above excludes VAT. Email us for a special offer for individuals paying the course on their own. VAT must be charged for French companies, or companies outside France without valid VAT information.
Sign Up Today & Claim The Bonuses
Embedded security is a fast-changing field. Because of that, everyone enrolled in the Embedded Security course will be invited to two additional webinars designed to keep you at the cutting edge of security developments.
Bonus #1: Yocto Project Security After Scarthgap
Get insider knowledge on the biggest YP security updates:
- Learn the revamped CVE-checking tools before your peers
- Discover the new SBOM generation features
- Be among the first to implement the latest security tooling
- Stay ahead of new vulnerabilities with updated techniques
Bonus #2: The Current State Of The Cyber Resilience Act
Gain essential insights for every embedded system developer:
- Get practical guidance on the final CRA version
- Learn what regulatory changes mean for your projects
- Avoid costly redesigns by building compliant systems from the start
The enrollment is open right now!
Need On-Demand Training Sessions?
We can organize on-demand (online or on your site) sessions. Contact us for details at contact@ygreky.com
Who Teaches This?
Marta Rybczynska has PhD in network security, and 20 years of experience in Open Source including 15 in embedded development. She has been working with embedded operating systems like Linux and various real-time ones, system libraries and frameworks up to user interfaces. Her specialties are architecture-specific parts of the Linux kernel. In the last years, she focuses on improving security of Open Source products. She is a member of the Security Team of the Yocto Project. In the past, Marta served as Vice-President and treasurer for KDE e.V. She is involved in various Open Source projects, and also contributing kernel-related guest articles for LWN.net. She has experience with presentations on both scientific and free software conferences, including LinuxCon, Open Source Summit, Embedded Linux Conference, Akademy and FOSDEM. |
Ygreky is a registred training organization under French law, registration number 84380947138 at préfet de région Auvergne-Rhône-Alpes.
Déclaration d’activité enregistrée sous le numéro 84380947138 auprès du préfet de région Auvergne-Rhône-Alpes.
Yocto Project and all related marks and logos are trademarks of The Linux Foundation. This training is not, in any way, endorsed by the Yocto Project or The Linux Foundation.
Any further questions? Contact us at contact@ygreky.com