The intersection of technologies!

Secure Coding For Medical Device Manufacturers Training

There is no planned dates for this training. Please contact us to plan the training by filling out the form.

Prerequisites

There are no prerequisites for this course.

The past few years have seen a massive increase in attacks, data breaches and medical identity theft targeting the healthcare industry; there have also been various ransomware attacks paralyzing healthcare computer networks as well as the various medical devices connected to them. The rise of mobile devices used in the industry needs to be addressed as well: there is a huge growth of medical software applications for mobiles and tablets that connect the patient with the organization – carrying and storing personally identifiable information (PII).

Healthcare is one of the business domains where security is absolutely crucial. Vulnerability is not an option when working with life-saving devices. There is also significant compliance pressure – if you want to stay a trusted and reliable vendor, your systems and applications need to comply with Health Information Portability and Accountability Act (HIPAA) requirements. To deal with these challenges, you need motivated secure coders with the right skills and the right attitude to fight security problems.

There are no prerequisites for this course.

C and C++ developers developing medical devices. 

  • Understand basic concepts of security, IT security and secure coding
  • Understand special threats in the healthcare sector
  • Understand regulations and standards
  • Realize the severe consequences of unsecure buffer handling
  • Understand the architectural protection techniques and their weaknesses
  • Have a practical understanding of cryptography
  • Learn about typical coding mistakes and how to avoid them
  • Be informed about recent vulnerabilities in various platforms, frameworks and libraries
  • Get sources and further readings on secure coding practices

  • IT security and secure coding
  • Special threats in the healthcare sector
  • Regulations and standards
  • x86 machine code, memory layout and stack operations
  • Buffer overflow
  • Practical cryptography
  • Common coding errors and vulnerabilities
  • Principles of security and secure coding
  • Knowledge sources

By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.