Device Security

Secure Bootstraps for Connected Products

Keys, attestation flows, and update policies explained without mystique.

Format: Blended · Level: Advanced · Duration: 5 weeks

Tuition (informational): 1,320,000 KRW

Secure Bootstraps for Connected Products

Lead mentor

Mateo Silva

Worked on wearable provisioning; prefers plain-language risk registers.

Overview

Security copy often scares teams into paralysis. Here you implement a minimal secure boot path, rotate signing keys with a checklist, and wire attestation evidence into a mock provisioning service. We highlight where external reviewers will ask questions so you can prepare evidence calmly.

What is included

  • Key ceremony walkthrough with paper trail template
  • Signed image pipeline on reference hardware
  • Attestation token validation lab
  • Rollback counters and fuse policy discussion
  • Threat-modeling session for supply chain tamper
  • Update policy draft with staged rollout
  • Office hours on Korean personal data handling references

Outcomes

  1. Produce a signed firmware artifact with checksum manifest
  2. Draft an attestation evidence packet for reviewers
  3. List three explicit non-goals for your security posture

Participant notes

  • Key ceremony template alone justified Secure Bootstraps. Still wish we had one more week on HSM vendor quirks—that is the honest trade-off.

    Jiwoo · Seoul · 4/5

  • Attestation lab mirrors how we now package evidence before external reviewers visit. Plain-language risk register is a quiet win.

    Nadia El-Sayed · HelioSense Labs · survey

FAQ

No. You will understand how to integrate secure boot and updates responsibly and when to pull in specialists.

Back to course table  ·  Talk with moderators