Practical Guide: Iso 21434,Tara For Automotive Cybersecurity
Published 1/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.95 GB | Duration: 3h 38m
Published 1/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.95 GB | Duration: 3h 38m
ISO 21434, CAL, TARA, Cybersecurity process, Clauses 5-14, Work packages (WP), Security concepts, Templates, Risk rating
What you'll learn
History of ISO 21434
Overview of ISO21434
Clause 5 : OCSM and practical work package
Clause 6 : Project specific cybersecurity management and practical work package
Clause 7: Distributed Cybersecurity
7.4.1 Supplier Capability
7.4.3 Alignment of Responsibilities
Clause 8: Continual Cybersecurity
Clause 9 : Concept
Clause 10 : Product Development
Clause 11: Cybersecurity Validation
Clause 12, 13, 14 Decommissioning
CAL : Cybersecurity Assurance Level
CAL - Development and Testing referrence
Vehicle Architecture for the examples - Explained
8 practical TARA examples
Requirements
Basic knowledge of cybersecurity
Description
This comprehensive course on ISO 21434 along with TARA provides a deep dive into automotive cybersecurity, with practical, real-world examples and hands-on activities. Designed for professionals and enthusiasts, the course explores the standard's key clauses, offering insights into managing cybersecurity at organizational, project-specific, and component levels. You'll gain actionable knowledge of cybersecurity assurance, validation, and decommissioning processes, all while working through real-world TARA (Threat Analysis and Risk Assessment) examplesSection 1: IntroductionGain a solid foundation in ISO 21434, its history, and key terminologies.Section 2: ISO 21434 WalkthroughUnderstand the structure and overarching principles of the standard.Sections 3–6: Core Clauses with Practical InsightsExplore Clause 5: Organizational Cybersecurity Management (OCSM) with hands-on work.Dive into Clause 6: Project-Specific Cybersecurity Management (PSCM), covering responsibilities, planning, tailoring, reuse, and assessment.Uncover Clause 7: Distributed cybersecurity principles and supplier alignment.Learn about Clause 8: Continual cybersecurity with hands-on practice.Sections 7–10: Concept, Development, and ValidationMaster the Concept Phase (Clause 9) with practical fuzzing analysis.Understand Product Development (Clause 10) through detailed work packages.Validate cybersecurity efforts through Clause 11 principles.Sections 11–12: Advanced ConceptsLearn TARA (Threat Analysis and Risk Assessment) steps in depth.Explore the Cybersecurity Assurance Level (CAL) framework, its levels, and applications in development and testing.Section 13: Vehicle ArchitectureGain insights into real-world automotive architecture for contextual examples.Sections 14–21: Practical TARA ExamplesApply your knowledge with hands-on TARA examples, including scenarios like remote start/stop, climatic control, OTA updates, and BCM operations.Section 22: ConclusionSummarize key learnings and understand the path forward in applying ISO 21434 standards
Overview
Section 1: Welcome Notes & Agenda
Lecture 1 Course Agenda
Section 2: Introduction
Lecture 2 Introduction - ISO 21434
Lecture 3 Introduction - TARA
Lecture 4 History of ISO 21434
Lecture 5 Key terms in the ISO doc
Section 3: ISO 21434 walkthrough
Lecture 6 Overview of ISO21434
Section 4: Clause 5 : OCSM and practical workpackage
Lecture 7 Core Principles of OCSM
Lecture 8 Hands on Part 1 : OCSM
Lecture 9 Hands on Part 2 : OCSM
Section 5: Clause 6 : Project specific cybersecurity management and practical work package
Lecture 10 Core Principles of PSCM - Part 1
Lecture 11 Core Principles of PSCM - Part 2
Lecture 12 6.4.1 Cybersecurity Project responsibilities
Lecture 13 6.4.2 Cybersecurity Plan
Lecture 14 6.4.3 Tailoring
Lecture 15 6.4.4 Re use
Lecture 16 6.4.5 & 6.4.6 Component out of context vs Off the shelf
Lecture 17 6.4.7 Cybersecurity Case
Lecture 18 6.4.8 Cybersecurity Assessment
Lecture 19 6.4.9 Release for post development
Lecture 20 Hands On Cybersecurity Plan and Cybersecurity Case
Section 6: Clause 7: Distributed Cybersecurity
Lecture 21 Core Principles of Distributed Cybersecurity
Lecture 22 7.4.1 Supplier Capability
Lecture 23 7.4.3 Alignment of Responsibilities
Section 7: Clause 8: Continual Cybersecurity
Lecture 24 Core Principles of Continual Cybersecurity
Lecture 25 Hands on Continual Cybersecurity
Section 8: Clause 9 : Concept
Lecture 26 Core Principles of Concept
Lecture 27 Work packages in Concept phase
Section 9: Clause 10 : Product Development
Lecture 28 Clause 10 : Core concept of Product Development
Lecture 29 Work packages in Product Development
Section 10: Clause 11: Cybersecurity Validation
Lecture 30 Core principles of Cybersecurity Validation
Lecture 31 Core principles of Cybersecurity Validation
Section 11: Clause 12, 13, 14 Decommissioning
Lecture 32 Core principles of Cybersecurity Decommissioning
Section 12: TARA - Practical Knowledge sharing
Lecture 33 TARA - Steps involved
Section 13: CAL : Cybersecurity Assurance Level
Lecture 34 CAL - Introduction
Lecture 35 CAL Levels Explanation
Lecture 36 CAL - When and How
Lecture 37 CAL - Development and Testing referrence
Section 14: Vehicle Architecture - Real time example
Lecture 38 Vehicle Architecture for the examples - Explained
Section 15: Example - 1
Lecture 39 TARA Example -1 Remote Start Stop
Section 16: Example - 2
Lecture 40 TARA Example -2 Climatic Control
Section 17: Example - 3
Lecture 41 TARA Example -3 Security access - 2
Section 18: Example - 4
Lecture 42 TARA Example 4 - Part -1
Lecture 43 TARA Example 4 - Part -2
Section 19: Example - 5
Lecture 44 TARA Example - 5 C-HPC to CZC
Section 20: Example - 6
Lecture 45 TARA Example - 6 OTA to C-HPC via CZC
Section 21: Example - 7
Lecture 46 TARA Example - 7 BCM Door lock and Unlock
Section 22: Example - 8
Lecture 47 TARA Example - 8 BCM OTA Update
Section 23: Conclusion
Lecture 48 Conclusion
Automotive cybersecurity engineer , Automotive cybersecurity managers , Automotive cybersecurity process team