Education & Training

PROTOTYPE PROGRAMME: 4.3 Types of technical reports

Format: Online

Language: English

14-22 June, 2022

Hours: 20

Instructor: Benoit MATHIEU

EQF level: 4

Host institution: AEROCAMPUS-Aquitaine (France)

Learn from the basics to some advanced techniques in this 20‐hours free course:

  • Identify main issues: security vulnerabilities, threats, risks, and their impacts
  • Apply main solutions: multi-factor device/user authentication schemes in addition to multi-factor cryptographic algorithms.
  • Implement cybersecurity (writing and reading an rfid card)

Drones suffer from several security vulnerabilities that can be exploited to launch dangerous attacks, which may have drastic consequences on critical infrastructures. Such attacks are possible due to the lack of security by design of robotic systems and the reliance on open wireless communication channels.

This course begins with an overview of the cybersecurity problem and recommended countermeasures. Then, two solutions are studied in detail: a low-cost solution based on of RFID modules, and a strong authentication scheme adopted by Parrot to design its last drone named ANAFI Ai which embeds a Secure Element compliant to the highest level of security.

SCHEDULE

14 June 2022

8:00 – 12:00 AM

Risk assessment reports

15 June 2022

2:00 – 6:00 PM

Safeguard solutions

16 June 2022 

8:00 – 12:00 AM

Communication techniques   (RFID, Web, etc.)

21 June 2022

8:00 – 12:00 AM

Communication techniques   (RFID, Web, etc.)

22 June 2022

2:00 – 6:00 PM

Cybersecurisation of a Flying   Drone ANAFI AI

IMPORTANT: This prototype programme is EXCLUSIVE FOR partners of the ASSETs+ consortium and associated stakeholders. If you want to join the ASSETs+ Stakeholders Group and become part of our ecosystem, please, click here.

This programme is focussed on:

  • Professionals working in Defence and AeroSpace Industry (up-skilling and re-skilling activities) and
  • University Licence students

Learning outcomes:

  • Communication techniques understanding
  • Technical representation description
  • Understanding cybersecurity issues and associated existing solutions
  • Understanding, reading and writing RFID cards
Share: