Robust design and defensive coding are primary conditions for realizing critical systems. Cyber security and functional safety both demand such design principles. Our training introduces to practically using design principles for cyber security and functional safety. It covers MISRA rules, architecture evaluation, design practices, and static code analysis. The format is a training with embedded workshop to also discuss specific situations from your side.
Our training leads to the topic of robust design and defensive coding. Experienced Vector experts show how the techniques are implemented efficiently and sustainably. In particular, we focus on the efficient implementation of code rules and static analysis, since we often observe that methods are adopted relatively rigidly, and thus cost unnecessarily.
You will learn from professionals for your practice from the world's leading company with a complete portfolio of functional safety from basic software (to ASIL-D), to individual control units, to advice and interim safety managers. We show from our worldwide industrial practice how implementation is implemented up to the highest level of integrity ASIL-D and the reference to safety objectives is shown.
Content and Agenda
Overview of standards for defensive coding, version history, orgin
Typical challenges and solutions
Defensive coding: Applying MISRA
Hands-on Practice: Analyze Code snippets
Defensive coding: Using static code analysis and fuzz testing
Hands-on Practice: Handling specific error types
Discussion with projects and practical guidance
700 € plus VAT (1 day)
Admission price includes full documentation on paper and as PDF and also our Vector book on "Automotive Embedded Engineering" with lots of best practices, project experiences and state of the art technology. Naturally all participants benefit from our rich coffee breaks and a quality lunch in our spectacular Vector restaurant. Each participant will receive a qualifying certificate for this intensive training.
Get a 10% discount (can be combined):
for virtual open training till end of September
if you register more than 2 participants of your company
if you book at least 60 days in advance
Full-time students receive a (non-combinable) discount of 70% (on presentation of a valid student card).
"Thank you very much for sharing your precious experience with this training program."
- Zerong Yu, Robert Bosch Japan
"High practical orientation, concrete personalized action list throughout the entire seminar."
- T. Strauch, Siemens
Do you want to adapt this training to your own examples and challenges? Looking for a workout that delivers practical exercises adjusted to your environment? Then, we suggest that you have this training conducted in-house, where you can decide on focus, speed and the training schedule. We also offer dedicated crash courses for employees and management.
This training targets professionals and executives in engineering and IT, project managers, system and software engineers, analysts, consultants, and developers and quality managers from companies of all industries and sizes that want to get more proficient in functional safety.
About our Trainers
Prof. Dr. Christof Ebert is managing director at Vector Consulting Services. He supports clients around the world to improve product strategy and product development and to manage organizational changes. Before he had been working for ten years in global senior management positions. A trusted advisor for companies around the world and a member of several of industry boards, he is a professor at the University of Stuttgart and at Sorbonne in Paris. He authored several books including the most recent “Global Software and IT” published by Wiley. For many years he has been serving on the editorial Board of the prestigious "IEEE Software" journal. Twitter: @ChristofEbert.
Youssef Rekik is a consultant and software developer at Vector Consulting Services. He is heavily involved in the development of security applications for smart connected embedded devices with focus on network security and communication technologies.