learn.keysight.com
Open in
urlscan Pro
52.60.165.183
Public Scan
Submitted URL: https://app.connection.keysight.com/e/er?elq_cid=6175096&cmpid=ELQ-21507&elqCampaignId=21507&s=609785623&lid=22460&elqTrackId=2B5E71...
Effective URL: https://learn.keysight.com/automotive-cybersecurity-everything-you-need-to-know?elq_cid=6175096&cmpid=ELQ-21507
Submission: On May 12 via api from FR — Scanned from FR
Effective URL: https://learn.keysight.com/automotive-cybersecurity-everything-you-need-to-know?elq_cid=6175096&cmpid=ELQ-21507
Submission: On May 12 via api from FR — Scanned from FR
Form analysis
1 forms found in the DOMhttps://learn.keysight.com/search
<form id="uf-search-form" class="uf-search-form" role="search" aria-label="Sitewide" action="https://learn.keysight.com/search">
<input type="search" name="ufq" id="uf-search-input" class="uf-search-input uf-input" placeholder="Search content" aria-label="Search content">
<input type="hidden" name="ufs" value="10198721">
<button type="submit" id="uf-search-submit" class="uf-search-submit" title="Search sitewide">
<i class="fas fa-search" aria-hidden="true"></i>
<span class="sr-only">Search sitewide</span>
</button>
<button type="button" id="uf-search-close" class="uf-search-close" title="Close Search Box">
<i class="fas fa-times" aria-hidden="true"></i>
<span class="sr-only">Close search box</span>
</button>
</form>
Text Content
This website uses cookies to improve your experience. Continue to use the website as normal if you agree to the use of cookies. To find out more about the cookies we use, see our Privacy Policy. If you decline, your information won’t be tracked when you visit this website. Accept Decline Contact Us Skip to main content Toggle menubar Keysight University * Toggle submenu for: Instruments * Oscilloscopes * RF * Power * Multimeters * Circuit Design * Digital Testing * Designing Your Lab * Toggle submenu for: Networks & Apps * Application Test Automation * Network Security & Test * Toggle submenu for: Industries * 5G * Automotive * IoT * NewSpace * Quantum * Radar Fundamentals * Semiconductor * Toggle submenu for: Boot Camps * Automotive Cybersecurity * Oscilloscopes * RF Field Testing Basics * Software Test Automation * Software - DevOps Continuous Testing Open search box Search sitewide Close search box Share this Stream SHARE THIS STREAM * Share on facebook * Share on twitter * Share on linkedin * Share on email AUTOMOTIVE CYBERSECURITY Cars have never been smarter — or more vulnerable to cyberattacks. Watch this bootcamp to discover what kinds of threats automakers are up against, why regulators and standards bodies are getting involved, and how an automated approach to cybersecurity testing protects the people behind the wheel. Explore content AUTOMOTIVE CYBERSECURITY: EVERYTHING YOU NEED TO KNOW * about 1 month ago LESSON 1 - PREVIEW: AUTOMOTIVE CYBERSECURITY BOOTCAMP What will this bootcamp cover? Get a quick overview of what you’ll learn from Mike Hodge - your host for this event. 3 min video View Course * about 1 month ago LESSON 2 – SECURING THE CONNECTED CAR: WHAT’S AT STAKE? What happens if a car gets hacked? Dick Ludwig, a Business Development Manager with Keysight, explains the many ways in which vehicles are vulnerable to cyberattacks - and what can happen when attacke 4 min video View Course * about 1 month ago LESSON 3 – VULNERABILITIES BEYOND THE VEHICLE Connected cars are vulnerable to a multitude of potential attack vectors - including many beyond the vehicle itself. Scott Register, Keysight’s VP of Security Solutions, has more. 3 min video View Course * about 1 month ago LESSON 4 – RULES AND REGULATIONS: VEHICULAR CYBERSECURITY You've probably heard about standards like ISO / SAE 21434 and regulations like UNECE WP.29 and UN R155. But what do they mean - and what kind of practical impact do they have on automakers? 4 min video View Course * about 1 month ago LESSON 5 – ADOPTING A CYBERSECURITY FRAMEWORK Now that you understand the kinds of threats vehicles are up against, let’s talk about how you can mitigate cybersecurity threats, in accordance with recent standards and regulations. 2 min video View Course * about 1 month ago LESSON 6 – TESTING CONSIDERATIONS FOR UNECE WP.29 / UN R155 Regulations like UN R155 require manufacturers to execute verification and validation tests on cybersecurity-related threats. But how does that work in practice? Join Thomas Leifert, Keysight’s Busine 4 min video View Course * about 1 month ago LESSON 7 – TESTING WITHIN A CYBERSECURITY MANAGEMENT SYSTEM Dick Ludwig explains how testing fits into a cybersecurity management system, as described by ISO / SAE 21434. 5 min video View Course * about 1 month ago LESSON 8 – SO, YOU WANT TO HACK A CAR? 2 min video View Course * about 1 month ago LESSON 9 – HOW DO YOU TEST AUTOMOTIVE CYBERSECURITY? Thomas Leifert explains how cybersecurity verification and validation testing works - and how it integrates into real-world workflows based on regulations like UN R155. 6 min video View Course * about 1 month ago LESSON 10 – WHAT IS PROTOCOL FUZZING? Protocol fuzzing is an important part of any automotive cybersecurity test plan - especially when it comes to finding upstream vulnerabilities in the supply chain. But how does a protocol fuzzing... 12 min video View Course * about 1 month ago LESSON 11 – DEMO: “HACKING” A CAR AT BLOCK HARBOR CYBERSECURITY Watch our partners at Block Harbor Cybersecurity take control of a vehicle’s headlight system using Keysight’s SA8710A Automotive Cybersecurity Penetration Test Platform. 4 min video View Course * about 1 month ago LESSON 12 – SECURITY DOESN’T STOP AT THE SHEETMETAL You might think that automotive cybersecurity is confined to the vehicle, but that’s just the tip of the iceberg. 2 min video View Course * about 1 month ago LESSON 13 – WHAT IS “CAR TO CLOUD” CYBERSECURITY? As cars get more connected, the line between vehicular cybersecurity and traditional network security is not as well-defined as it once was. What does that mean - and how can you adapt? 8 min video View Course * about 1 month ago LESSON 14 – NETWORK SECURITY: WHAT RISKS DO AUTOMAKERS FACE? What kinds of vehicular mischief and mayhem can cybercriminals cause if they breach an automaker’s back-end network? 5 min video View Course * about 1 month ago LESSON 15 – CONTINUOUSLY TESTING YOUR NETWORK’S DEFENSES When it comes to network security, your best defense is to think like the enemy. By safely simulating attacks on your live network, you can pinpoint and fix vulnerabilities before cybercriminals... 14 min video View Course * about 1 month ago LESSON 16 – CURTAILING ALERT FATIGUE IN NETWORK SECURITY TEAMS Information security teams are inundated by alerts from their security information and event management (SIEM) tools. However, most of those alarms aren’t actionable - and waste your team’s... 5 min video View Course * about 1 month ago LESSON 17 – WHAT IS APPLICATION AND THREAT INTELLIGENCE? Discover the value of application and threat intelligence, and why it’s so important to have both feeding into your automotive cybersecurity and network security tools. 8 min video View Course * about 1 month ago LESSON 18 – AUTOMOTIVE CYBERSECURITY: PROTECT WHAT MATTERS MOST With an integrated, automated, and intelligent approach to automotive cybersecurity, you can rest assured knowing your systems are shielded, your vehicles are secure, and your passengers are safe. 1 min video View Course © Keysight University EXPLORE * Products + Services * Solutions * Industries * Events * Keysight University INSIGHTS * Discover Insights * Success Stories * Resources * Blog * Community PARTNERS SUPPORT * Keysight Product Support * Ixia Product Support * Manage Software Licenses * Product Order Status * Parts ABOUT KEYSIGHT * Newsroom * Investor Relations * Corporate Social Responsibility * Diversity, Equity, and Inclusion * Modern Slavery Act Transparency Statement * Careers * * © Keysight Technologies 2000–2022 * Privacy * Terms * Feedback