Course Description
Cars are no longer just a means of transportation. They are now computers on wheels, with sophisticated technologies that can be hacked just like any other device. This means that automotive hacking is becoming a major concern for companies and the US military, and that's why it's essential for IT professionals to have a deep understanding of automotive security.
The Boston Cybernetics Institute's Car Hacking 101 course is designed to provide a comprehensive overview of car hacking and help IT professionals gain the knowledge and skills necessary to protect vehicles from cyber attacks. In this course, you will learn about the different types of car hacking, the tools and techniques used by hackers, and the latest developments in automotive security.
In this car hacking course, our expert instructors will guide you through hands-on exercises using car hacking devices, car hacker apps, and car hacking software. You will also learn how to detect and prevent car hacking attacks, as well as how to respond to security breaches. By the end of the course, you will have a deep understanding of automotive hacking in cybersecurity, and be able to apply this knowledge to your organization's IT security strategy.
Who should take this car hacking training?
Automotive manufacturers and suppliers: Our course is ideal for automotive manufacturers and suppliers who want to ensure the security of their vehicles and systems. By providing their IT professionals with our course, they can learn how to identify and mitigate potential security vulnerabilities, perform penetration testing, and develop effective security controls for automotive systems.
Fleet managers: Our course is also beneficial for fleet managers who want to protect their vehicles from potential cyber threats. By taking our course, they can learn how to prevent, detect, and respond to car hacking incidents, minimizing the risk of data theft or vehicle downtime.
Government agencies: Government agencies responsible for maintaining the safety and security of their citizens can benefit from our Car Hacking course. By training their IT professionals in automotive IT security, they can ensure that their fleets of vehicles, including emergency service vehicles, are protected from potential cyber threats.
Cybersecurity professionals: Cybersecurity professionals looking to specialize in automotive IT security can benefit greatly from our course. By gaining expertise in this area, they can become valuable assets to their organizations and help protect against an emerging threat landscape.
This course covers essential knowledge and skills for professionals in the automotive industry, particularly those concerned with security in cars. It is also relevant for cybersecurity experts and government officials who want to ensure the protection of fleets, data, and citizens against potential cyber threats. With this training, professionals can better safeguard their vehicles, networks, and sensitive information from cybercriminals, and stay up-to-date with the latest best practices in automotive cybersecurity.
Learning Topics
Hardware
RF signals
Software systems
Hardware systems
Cyber-Physical Systems
Infrastructure
Learning Objectives
Upon completion of this course, students will be able to:
Develop a comprehensive understanding of automotive security, including the risks associated with car hacking and how to protect your organization's fleet from potential cyber threats.
Gain practical skills in car hacking techniques and tools, equipping you with the knowledge and expertise to identify and exploit vulnerabilities in car systems.
Learn how to reverse engineer automotive systems, conduct penetration testing, and perform vulnerability scanning to assess your organization's security posture and improve defenses.
Acquire a technical understanding of automotive systems and how they can be secured, including cryptography, secure coding practices, and access controls, allowing you to implement effective security measures in your organization.
Analyze real-world examples of car hacking incidents, and learn how to detect, prevent, and respond to such incidents, minimizing the potential impact on your organization.
Understand the legal and ethical considerations of car hacking, ensuring your organization's security testing is conducted within the boundaries of the law and ethical principles.
Prerequisites:
Basic knowledge of computer systems and networks, including TCP/IP protocols, operating systems, and programming languages such as Python.
Familiarity with cyber security concepts, including threat modeling, risk assessment, and security controls.
Required Hardware/Software
Students are expected to bring their own laptops to the car hacking training. The laptops are required to run a 30GB virtual machine but will not perform any intensive computation. A recommended hardware configuration would have the following:
50 GB of free hard disk space
16 GB of RAM
4 Processor cores
VMWare or Virtual Box to import an ova file
Example Course Schedule:
Day 1:
Introduction to automotive security and car hacking
Understanding automotive systems and architecture
Identifying and exploiting vulnerabilities in car systems
Hands-on exercises using car hacking tools and techniques
Day 2:
Reverse engineering automotive systems
Conducting penetration testing and vulnerability scanning
Implementing cryptography and secure coding practices in automotive systems
Analyzing real-world examples of car hacking incidents
Day 3:
Legal and ethical considerations of car hacking
Developing effective security controls for automotive systems
Best practices for preventing, detecting, and responding to car hacking incidents
Final project: designing and implementing a secure automotive system
About Boston Cybernetics Institute
Boston Cybernetics Institute, PBC was created by former MIT Lincoln Lab cybersecurity researchers to give meaningful niche cyber instruction to a new generation of cybersecurity professionals.
We avoid the normal style of teaching with PowerPoint and lectures, opting to provide instead real-life engaging instruction that takes place in a customized environment. We have given our style of instruction to multiple DoD agencies, US commercial companies, and international companies.
Instructors at Boston Cybernetics Institute
Jeremy Blackthorne
President of the Boston Cybernetics Institute
Jeremy Blackthorne is a Lead Instructor at the Boston Cybernetics Institute (BCI). Before BCI, he was a researcher in the Cyber System Assessments group at MIT Lincoln Laboratory. Blackthorne is the co-creator and instructor for the Rensselaer Polytechnic Institute (RPI) courses: Modern Binary Exploitation, Spring 2015 and Malware Analysis, Spring 2013. Jeremy has published research at various academic and industry conferences. He served in the U.S. Marine Corps and is an alumnus of RPISEC. He holds a BS and MS in computer science. Blackthorne was an active member of the Student Security Club and CTF team, RPISEC, from 2012 to 2015, where he taught seminars on Reverse-Engineering, Exploitation, and various other Cybersecurity topics.
Clark Wood
security researcher and instructor
Clark Wood is a security researcher and instructor at the Boston Cybernetics Institute (BCI), focusing on Reverse Engineering, Exploitation, and CI/CD. He recently built a Reverse-Engineering and Exploitation platform for a DoD customer and is the Lead Engineer for BCI’s Government Services. Clark was formerly on the technical staff at MIT Lincoln Laboratory where he was a member of the Cyber System Assessments Group. Clark holds a BA in Economics from the University of Florida, a BS and MS in Computer Science from Florida State University, and a Master’s in Technology and Policy from MIT.
Rodolfo Cuevas
security researcher and instructor
Rodolfo Cuevas is a security researcher and instructor at BCI, where he focuses on understanding how design constraints can be used to limit the impact of an attacker on a system. His research combines the adversarial mindset with approaches influenced by Systems and Control Theory. Rodolfo was a staff member at MIT Lincoln Laboratory and began his career as a RADAR and Ballistic Missile Defense System (BMDS) analyst. Later, Rodolfo transitioned to evaluating and Red-Teaming tactical and commercial cyber systems in support of DoD and other government programs. Rodolfo holds a BS, M.Eng., and M.S. in Electrical and Computer Engineering from Cornell University.
Reed Porada
security researcher and instructor
Reed Porada is a security researcher and instructor at BCI, focused on getting to the "so what" of both defensive and offensive cyber measures. Reed also leads BCI training in Cyber Systems Analysis, focusing on developing systems-thinking skills of developers up to managers. Reed was a staff member at MIT Lincoln Laboratory for ten years, where he was responsible for Test and Evaluation, Test Automation Research, Red-Teaming of Cyber Systems, and Blue System Architectures. Reed was a computer scientist at the Naval Research Laboratory focused on wireless communication systems. He holds a BS in Computer Science from the University of Maryland, College Park and an MS in Software Engineering from Carnegie Mellon University.