learn.keysight.com Open in urlscan Pro
52.60.165.183  Public Scan

Submitted URL: https://app.connection.keysight.com/e/er?elq_cid=6175096&cmpid=ELQ-21507&elqCampaignId=21507&s=609785623&lid=22460&elqTrackId=2B5E71...
Effective URL: https://learn.keysight.com/automotive-cybersecurity-everything-you-need-to-know?elq_cid=6175096&cmpid=ELQ-21507
Submission: On May 12 via api from FR — Scanned from FR

Form analysis 1 forms found in the DOM

https://learn.keysight.com/search

<form id="uf-search-form" class="uf-search-form" role="search" aria-label="Sitewide" action="https://learn.keysight.com/search">
  <input type="search" name="ufq" id="uf-search-input" class="uf-search-input uf-input" placeholder="Search content" aria-label="Search content">
  <input type="hidden" name="ufs" value="10198721">
  <button type="submit" id="uf-search-submit" class="uf-search-submit" title="Search sitewide">
    <i class="fas fa-search" aria-hidden="true"></i>
    <span class="sr-only">Search sitewide</span>
  </button>
  <button type="button" id="uf-search-close" class="uf-search-close" title="Close Search Box">
    <i class="fas fa-times" aria-hidden="true"></i>
    <span class="sr-only">Close search box</span>
  </button>
</form>

Text Content

This website uses cookies to improve your experience. Continue to use the
website as normal if you agree to the use of cookies. To find out more about the
cookies we use, see our Privacy Policy. If you decline, your information won’t
be tracked when you visit this website.

Accept Decline
Contact Us
Skip to main content
Toggle menubar

Keysight University

 * Toggle submenu for: Instruments
   * Oscilloscopes
   * RF
   * Power
   * Multimeters
   * Circuit Design
   * Digital Testing
   * Designing Your Lab
 * Toggle submenu for: Networks & Apps
   * Application Test Automation
   * Network Security & Test
 * Toggle submenu for: Industries
   * 5G
   * Automotive
   * IoT
   * NewSpace
   * Quantum
   * Radar Fundamentals
   * Semiconductor
 * Toggle submenu for: Boot Camps
   * Automotive Cybersecurity
   * Oscilloscopes
   * RF Field Testing Basics
   * Software Test Automation
   * Software - DevOps Continuous Testing

Open search box
Search sitewide Close search box
Share this Stream


SHARE THIS STREAM

 * Share on facebook
 * Share on twitter
 * Share on linkedin
 * Share on email


AUTOMOTIVE CYBERSECURITY

Cars have never been smarter — or more vulnerable to cyberattacks.
Watch this bootcamp to discover what kinds of threats automakers are up against,
why regulators and standards bodies are getting involved, and how an automated
approach to cybersecurity testing protects the people behind the wheel.

Explore content



AUTOMOTIVE CYBERSECURITY: EVERYTHING YOU NEED TO KNOW

 * about 1 month ago
   
   
   
   LESSON 1 - PREVIEW: AUTOMOTIVE CYBERSECURITY BOOTCAMP
   
   What will this bootcamp cover? Get a quick overview of what you’ll learn from
   Mike Hodge - your host for this event.
   
   3 min video
   
   View Course

 * about 1 month ago
   
   
   
   LESSON 2 – SECURING THE CONNECTED CAR: WHAT’S AT STAKE?
   
   What happens if a car gets hacked? Dick Ludwig, a Business Development
   Manager with Keysight, explains the many ways in which vehicles are
   vulnerable to cyberattacks - and what can happen when attacke
   
   4 min video
   
   View Course

 * about 1 month ago
   
   
   
   LESSON 3 – VULNERABILITIES BEYOND THE VEHICLE
   
   Connected cars are vulnerable to a multitude of potential attack vectors -
   including many beyond the vehicle itself. Scott Register, Keysight’s VP of
   Security Solutions, has more.
   
   3 min video
   
   View Course

 * about 1 month ago
   
   
   
   LESSON 4 – RULES AND REGULATIONS: VEHICULAR CYBERSECURITY
   
   You've probably heard about standards like ISO / SAE 21434 and regulations
   like UNECE WP.29 and UN R155. But what do they mean - and what kind of
   practical impact do they have on automakers?
   
   4 min video
   
   View Course

 * about 1 month ago
   
   
   
   LESSON 5 – ADOPTING A CYBERSECURITY FRAMEWORK
   
   Now that you understand the kinds of threats vehicles are up against, let’s
   talk about how you can mitigate cybersecurity threats, in accordance with
   recent standards and regulations.
   
   2 min video
   
   View Course

 * about 1 month ago
   
   
   
   LESSON 6 – TESTING CONSIDERATIONS FOR UNECE WP.29 / UN R155
   
   Regulations like UN R155 require manufacturers to execute verification and
   validation tests on cybersecurity-related threats. But how does that work in
   practice? Join Thomas Leifert, Keysight’s Busine
   
   4 min video
   
   View Course

 * about 1 month ago
   
   
   
   LESSON 7 – TESTING WITHIN A CYBERSECURITY MANAGEMENT SYSTEM
   
   Dick Ludwig explains how testing fits into a cybersecurity management system,
   as described by ISO / SAE 21434.
   
   5 min video
   
   View Course

 * about 1 month ago
   
   
   
   LESSON 8 – SO, YOU WANT TO HACK A CAR?
   
   2 min video
   
   View Course

 * about 1 month ago
   
   
   
   LESSON 9 – HOW DO YOU TEST AUTOMOTIVE CYBERSECURITY?
   
   Thomas Leifert explains how cybersecurity verification and validation testing
   works - and how it integrates into real-world workflows based on regulations
   like UN R155.
   
   6 min video
   
   View Course

 * about 1 month ago
   
   
   
   LESSON 10 – WHAT IS PROTOCOL FUZZING?
   
   Protocol fuzzing is an important part of any automotive cybersecurity test
   plan - especially when it comes to finding upstream vulnerabilities in the
   supply chain. But how does a protocol fuzzing...
   
   12 min video
   
   View Course

 * about 1 month ago
   
   
   
   LESSON 11 – DEMO: “HACKING” A CAR AT BLOCK HARBOR CYBERSECURITY
   
   Watch our partners at Block Harbor Cybersecurity take control of a vehicle’s
   headlight system using Keysight’s SA8710A Automotive Cybersecurity
   Penetration Test Platform.
   
   4 min video
   
   View Course

 * about 1 month ago
   
   
   
   LESSON 12 – SECURITY DOESN’T STOP AT THE SHEETMETAL
   
   You might think that automotive cybersecurity is confined to the vehicle, but
   that’s just the tip of the iceberg.
   
   2 min video
   
   View Course

 * about 1 month ago
   
   
   
   LESSON 13 – WHAT IS “CAR TO CLOUD” CYBERSECURITY?
   
   As cars get more connected, the line between vehicular cybersecurity and
   traditional network security is not as well-defined as it once was. What does
   that mean - and how can you adapt?
   
   8 min video
   
   View Course

 * about 1 month ago
   
   
   
   LESSON 14 – NETWORK SECURITY: WHAT RISKS DO AUTOMAKERS FACE?
   
   What kinds of vehicular mischief and mayhem can cybercriminals cause if they
   breach an automaker’s back-end network?
   
   5 min video
   
   View Course

 * about 1 month ago
   
   
   
   LESSON 15 – CONTINUOUSLY TESTING YOUR NETWORK’S DEFENSES
   
   When it comes to network security, your best defense is to think like the
   enemy. By safely simulating attacks on your live network, you can pinpoint
   and fix vulnerabilities before cybercriminals...
   
   14 min video
   
   View Course

 * about 1 month ago
   
   
   
   LESSON 16 – CURTAILING ALERT FATIGUE IN NETWORK SECURITY TEAMS
   
   Information security teams are inundated by alerts from their security
   information and event management (SIEM) tools. However, most of those alarms
   aren’t actionable - and waste your team’s...
   
   5 min video
   
   View Course

 * about 1 month ago
   
   
   
   LESSON 17 – WHAT IS APPLICATION AND THREAT INTELLIGENCE?
   
   Discover the value of application and threat intelligence, and why it’s so
   important to have both feeding into your automotive cybersecurity and network
   security tools.
   
   8 min video
   
   View Course

 * about 1 month ago
   
   
   
   LESSON 18 – AUTOMOTIVE CYBERSECURITY: PROTECT WHAT MATTERS MOST
   
   With an integrated, automated, and intelligent approach to automotive
   cybersecurity, you can rest assured knowing your systems are shielded, your
   vehicles are secure, and your passengers are safe.
   
   1 min video
   
   View Course

© Keysight University

EXPLORE

 * Products + Services
 * Solutions
 * Industries
 * Events
 * Keysight University

INSIGHTS

 * Discover Insights
 * Success Stories
 * Resources
 * Blog
 * Community

PARTNERS

SUPPORT

 * Keysight Product Support
 * Ixia Product Support
 * Manage Software Licenses
 * Product Order Status
 * Parts

ABOUT KEYSIGHT

 * Newsroom
 * Investor Relations
 * Corporate Social Responsibility
 * Diversity, Equity, and Inclusion
 * Modern Slavery Act Transparency Statement
 * Careers



 * 

 * © Keysight Technologies 2000–2022
 * Privacy
 * Terms
 * Feedback