Tags
Language
Tags
April 2025
Su Mo Tu We Th Fr Sa
30 31 1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 1 2 3
Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
SpicyMags.xyz

Practical Guide: Iso 21434,Tara For Automotive Cybersecurity

Posted By: ELK1nG
Practical Guide: Iso 21434,Tara For Automotive Cybersecurity

Practical Guide: Iso 21434,Tara For Automotive Cybersecurity
Published 1/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.95 GB | Duration: 3h 38m

ISO 21434, CAL, TARA, Cybersecurity process, Clauses 5-14, Work packages (WP), Security concepts, Templates, Risk rating

What you'll learn

History of ISO 21434

Overview of ISO21434

Clause 5 : OCSM and practical work package

Clause 6 : Project specific cybersecurity management and practical work package

Clause 7: Distributed Cybersecurity

7.4.1 Supplier Capability

7.4.3 Alignment of Responsibilities

Clause 8: Continual Cybersecurity

Clause 9 : Concept

Clause 10 : Product Development

Clause 11: Cybersecurity Validation

Clause 12, 13, 14 Decommissioning

CAL : Cybersecurity Assurance Level

CAL - Development and Testing referrence

Vehicle Architecture for the examples - Explained

8 practical TARA examples

Requirements

Basic knowledge of cybersecurity

Description

This comprehensive course on ISO 21434 along with TARA provides a deep dive into automotive cybersecurity, with practical, real-world examples and hands-on activities. Designed for professionals and enthusiasts, the course explores the standard's key clauses, offering insights into managing cybersecurity at organizational, project-specific, and component levels. You'll gain actionable knowledge of cybersecurity assurance, validation, and decommissioning processes, all while working through real-world TARA (Threat Analysis and Risk Assessment) examplesSection 1: IntroductionGain a solid foundation in ISO 21434, its history, and key terminologies.Section 2: ISO 21434 WalkthroughUnderstand the structure and overarching principles of the standard.Sections 3–6: Core Clauses with Practical InsightsExplore Clause 5: Organizational Cybersecurity Management (OCSM) with hands-on work.Dive into Clause 6: Project-Specific Cybersecurity Management (PSCM), covering responsibilities, planning, tailoring, reuse, and assessment.Uncover Clause 7: Distributed cybersecurity principles and supplier alignment.Learn about Clause 8: Continual cybersecurity with hands-on practice.Sections 7–10: Concept, Development, and ValidationMaster the Concept Phase (Clause 9) with practical fuzzing analysis.Understand Product Development (Clause 10) through detailed work packages.Validate cybersecurity efforts through Clause 11 principles.Sections 11–12: Advanced ConceptsLearn TARA (Threat Analysis and Risk Assessment) steps in depth.Explore the Cybersecurity Assurance Level (CAL) framework, its levels, and applications in development and testing.Section 13: Vehicle ArchitectureGain insights into real-world automotive architecture for contextual examples.Sections 14–21: Practical TARA ExamplesApply your knowledge with hands-on TARA examples, including scenarios like remote start/stop, climatic control, OTA updates, and BCM operations.Section 22: ConclusionSummarize key learnings and understand the path forward in applying ISO 21434 standards

Overview

Section 1: Welcome Notes & Agenda

Lecture 1 Course Agenda

Section 2: Introduction

Lecture 2 Introduction - ISO 21434

Lecture 3 Introduction - TARA

Lecture 4 History of ISO 21434

Lecture 5 Key terms in the ISO doc

Section 3: ISO 21434 walkthrough

Lecture 6 Overview of ISO21434

Section 4: Clause 5 : OCSM and practical workpackage

Lecture 7 Core Principles of OCSM

Lecture 8 Hands on Part 1 : OCSM

Lecture 9 Hands on Part 2 : OCSM

Section 5: Clause 6 : Project specific cybersecurity management and practical work package

Lecture 10 Core Principles of PSCM - Part 1

Lecture 11 Core Principles of PSCM - Part 2

Lecture 12 6.4.1 Cybersecurity Project responsibilities

Lecture 13 6.4.2 Cybersecurity Plan

Lecture 14 6.4.3 Tailoring

Lecture 15 6.4.4 Re use

Lecture 16 6.4.5 & 6.4.6 Component out of context vs Off the shelf

Lecture 17 6.4.7 Cybersecurity Case

Lecture 18 6.4.8 Cybersecurity Assessment

Lecture 19 6.4.9 Release for post development

Lecture 20 Hands On Cybersecurity Plan and Cybersecurity Case

Section 6: Clause 7: Distributed Cybersecurity

Lecture 21 Core Principles of Distributed Cybersecurity

Lecture 22 7.4.1 Supplier Capability

Lecture 23 7.4.3 Alignment of Responsibilities

Section 7: Clause 8: Continual Cybersecurity

Lecture 24 Core Principles of Continual Cybersecurity

Lecture 25 Hands on Continual Cybersecurity

Section 8: Clause 9 : Concept

Lecture 26 Core Principles of Concept

Lecture 27 Work packages in Concept phase

Section 9: Clause 10 : Product Development

Lecture 28 Clause 10 : Core concept of Product Development

Lecture 29 Work packages in Product Development

Section 10: Clause 11: Cybersecurity Validation

Lecture 30 Core principles of Cybersecurity Validation

Lecture 31 Core principles of Cybersecurity Validation

Section 11: Clause 12, 13, 14 Decommissioning

Lecture 32 Core principles of Cybersecurity Decommissioning

Section 12: TARA - Practical Knowledge sharing

Lecture 33 TARA - Steps involved

Section 13: CAL : Cybersecurity Assurance Level

Lecture 34 CAL - Introduction

Lecture 35 CAL Levels Explanation

Lecture 36 CAL - When and How

Lecture 37 CAL - Development and Testing referrence

Section 14: Vehicle Architecture - Real time example

Lecture 38 Vehicle Architecture for the examples - Explained

Section 15: Example - 1

Lecture 39 TARA Example -1 Remote Start Stop

Section 16: Example - 2

Lecture 40 TARA Example -2 Climatic Control

Section 17: Example - 3

Lecture 41 TARA Example -3 Security access - 2

Section 18: Example - 4

Lecture 42 TARA Example 4 - Part -1

Lecture 43 TARA Example 4 - Part -2

Section 19: Example - 5

Lecture 44 TARA Example - 5 C-HPC to CZC

Section 20: Example - 6

Lecture 45 TARA Example - 6 OTA to C-HPC via CZC

Section 21: Example - 7

Lecture 46 TARA Example - 7 BCM Door lock and Unlock

Section 22: Example - 8

Lecture 47 TARA Example - 8 BCM OTA Update

Section 23: Conclusion

Lecture 48 Conclusion

Automotive cybersecurity engineer , Automotive cybersecurity managers , Automotive cybersecurity process team