Criteria

Text:
Display:

Results

Viewing 1 to 8 of 8
2018-02-12 ...
  • February 12-16, 2018 (3 Sessions) - Live Online
  • June 18-22, 2018 (3 Sessions) - Live Online
  • December 3-7, 2018 (3 Sessions) - Live Online
Training / Education Online Web Seminars
Connected vehicles are increasingly seen as a target for cybersecurity attacks. A key differentiator for the automotive industry is the use of cyber-physical systems, where a successful cybersecurity attack can affect physical entities. Often involving embedded electronics and real time control, these systems require different solutions in addition to established IT security principles and reactive responses to threats. Cybersecurity needs to be designed and built into cyber-physical systems throughout the development lifecycle to provide defense in depth.
2018-03-12 ...
  • March 12-13, 2018 (8:30 a.m. - 4:30 p.m.) - Troy, Michigan
  • August 13-14, 2018 (8:30 a.m. - 4:30 p.m.) - Troy, Michigan
Training / Education Classroom Seminars
Signal processing has become a critical tool in optimizing vehicle noise. This seminar will help you to understand the foundation common to all NVH data acquisition equipment including digitizing, windows, aliasing, averaging techniques, and common analysis functions such as the power spectrum, transfer function and coherence. Fundamental concepts such as filtering, modulation, convolution, and correlation, as well as specialized techniques used in rotating machinery such as adaptive re-sampling and order tracking, will be covered.
Training / Education Classroom Seminars
Photographs and video recordings of vehicle crashes and accident sites are more prevalent than ever, with dash mounted cameras, surveillance footage, and personal cell phones now ubiquitous. The information contained in these pictures and video provide critical information to understanding how crashes occurred, and in analyzing physical evidence. This course teaches the theory and techniques for getting the most out of digital media, including correctly processing raw video and photographs, correcting for lens distortion, and using photogrammetric techniques to convert the information in digital media to usable scaled three-dimensional data.
2018-02-26 ...
  • February 26-March 2, 2018 (3 Sessions) - Live Online
Training / Education Online Web Seminars
SAE J3061 sets out a recommended cybersecurity engineering process framework for organizations developing cyber physical systems. One of the recommendations of this framework is to carry out a threat analysis and risk assessment early in the product development. A threat analysis identifies and models the relevant threats against assets, and a risk assessment classifies the impact and likelihood associated with each threat. The approach enables the prioritization of risks and appropriate risk treatment measures to be determined in subsequent development phases.
Training / Education Classroom Seminars
The automotive industry is the new "battleground" for cybersecurity. Following the path of desktops/laptops, tablets, and mobile phones, the automotive industry is now the "hot" area for both academic researchers and hackers. This will transform the automotive industry just as it transformed traditional information technology and the mobile markets; it is inescapable, but it can be beneficial and a well prepared company can find significant benefit in being a market leader. What does cybersecurity mean? Who is attacking and why? What must we change? What can stay the same? What is the larger organization's role in cyber?
2018-04-23 ...
  • April 23-25, 2018 (8:30 a.m. - 4:30 p.m.) - El Segundo, California
  • August 6-8, 2018 (8:30 a.m. - 4:30 p.m.) - Herndon, Virginia
  • November 5-7, 2018 (8:30 a.m. - 4:30 p.m.) - Phoenix, Arizona
Training / Education Classroom Seminars
Crash reconstruction utilizes principles of physics and empirical data to analyze the physical, electronic, video, audio, and testimonial evidence from a crash to determine how and why the crash occurred. This course will cover basic principles and approaches to accident reconstruction (breaking the analysis down into phases, for instance). Methods of evidence documentation will be covered.
2018-04-23 ...
  • April 23-24, 2018 (8:30 a.m. - 4:30 p.m.) - Troy, Michigan
  • October 15-16, 2018 (8:30 a.m. - 4:30 p.m.) - Troy, Michigan
Training / Education Classroom Seminars
Embedded hardware is everywhere you look today from your vehicle’s infotainment system to refrigerator to medical devices and everything else in-between. With so much exposure one would think that such devices are secure against attack; however, sadly for a large number of devices this is not the case. For proof, just look no further than your local news reports. They are full of reports on devices being hacked into. So, as engineers, how do we go about first identifying and mitigating (or capitalizing) the potential security vulnerabilities within these devices?
Training / Education Classroom Seminars
Connected vehicles are increasingly seen as a potential target for cybersecurity attacks. A key differentiator for the automotive industry is the use of cyber-physical systems, where a successful cybersecurity attack could affect physical entities. Often involving embedded electronics and real time control, these systems require different solutions in addition to established IT security principles and reactive responses to threats. Cybersecurity needs to be designed and built into cyber-physical systems throughout the development lifecycle to provide defense in depth.
Viewing 1 to 8 of 8