Lesson 1Logical architecture mapping: methods fi document network zones, trust boundaries, data flows between ECUs, gateway, telematics, an cloudDis section present methods fi document logical architectures, includin network zones, trust boundaries, an data flows between ECUs, gateways, telematics units, an cloud services, supportin systematic threat modelin an controls.
Identifyin assets an communication endpointsDefinin network zones an security levelsDocumentin trust boundaries an assumptionsModelin ECU, gateway, an cloud data flowsUsin diagrams fi support threat modelinLesson 2Automotive Ethernet fundamentals: PHY, switched topology, VLANs, TSN basics relevant to vehiclesDis section cover Automotive Ethernet basics, includin PHY options, cablin, an switched topologies. It explain VLAN segmentation, QoS, an TSN features dat support deterministic, safety-relevant traffic in modern vehicle networks.
Automotive Ethernet PHYs an cablin optionsSwitched topologies an redundancy patternsVLAN segmentation an traffic separationQuality of Service an priority mechanismsTSN concepts fi deterministic in-vehicle trafficLesson 3CAN bus fundamentals: signal framing, message IDs, arbitration, ECU rolesDis section introduce CAN bus concepts, includin frame structure, identifiers, an arbitration. It explain ECU roles pon di bus, typical signalin patterns, an timin behavior, preparin learners fi analyze an secure CAN traffic.
CAN frame structure an bit-level signalinStandard vs extended identifiers an ID designArbitration, bus load, an priority handlinECU transmit, receive, an diagnostic rolesError handlin, fault confinement, an bus-offLesson 4ECU types and responsibilities: powertrain, gateway, infotainment, telematics, domain controllersDis section classify ECU types an dem responsibilities, includin powertrain, body, infotainment, telematics, an domain or zone controllers, an explain how dem roles influence security priorities an network placement.
Powertrain an chassis control ECUsBody, comfort, an ADAS control modulesInfotainment head units an media modulesTelematics control units an connectivity ECUsDomain an zone controllers in new E/E designsLesson 5External interfaces mapping: cellular modem, Wi‑Fi, Bluetooth, OBD‑II — protocols, typical vulnerabilities, typical access modelsDis section map key external interfaces such as cellular, Wi‑Fi, Bluetooth, an OBD‑II. It review protocols, common vulnerabilities, an access models, highlightin how attackers pivot from external surfaces into in-vehicle networks.
Cellular modem stacks an remote access pathsWi‑Fi client, hotspot, an provisionin modelsBluetooth profiles an pairin weaknessesOBD‑II physical access an diagnostic protocolsCommon misconfigurations an abuse scenariosLesson 6Data classification and sensitive assets: safety-critical messages, cryptographic keys, firmware images, personal data on infotainment/telematicsDis section introduce data classification fi automotive systems, focusin pon safety-critical signals, cryptographic keys, firmware images, an personal data, an explain how classification guide protection an retention controls.
Identifyin safety-critical control messagesManagin cryptographic keys an key materialProtectin firmware images an update filesHandlin personal an telemetry data in vehiclesRetention, deletion, an forensic requirementsLesson 7Cloud backend components and interfaces: backend update server, device registry, authentication, telemetry ingestion, API gatewaysDis section explain cloud backend components dat interact wid vehicles, includin update servers, device registries, authentication services, telemetry ingestion, an API gateways, emphasizin trust, identity, an secure data exchange.
Backend update servers an campaign controlDevice identity, registry, an lifecycle statesAuthentication, tokens, an certificate handlinTelemetry ingestion, storage, an analytics flowsAPI gateways, rate limitin, an zero trustLesson 8Gateway ECU function and secure gateway design patterns: routing, protocol translation, firewalling, isolationDis section detail gateway ECU functions, includin routin, protocol translation, an traffic filterin. It introduce secure gateway design patterns fi isolation, intrusion detection support, an controlled diagnostic access.
Routin between CAN, LIN, an Ethernet segmentsProtocol translation an message normalizationFirewall rules an policy enforcement pointsNetwork segmentation an isolation strategiesSecure diagnostics an authenticated access