Crypto Chip-Set Security Training in Sweden

  • Learn via: Classroom / Virtual Classroom / Online
  • Duration: 3 Days
  • Price: Please contact for booking options
We can host this training at your preferred location. Contact us!

The biggest challenge for professionals working on design and development of crypto chip-sets is to be continuously up-to-date regarding the attack methods and their mitigation. Serving them, this course explains various physical and logical attacks on security chips, possible countermeasures and best practices.

Regarding physical attacks, the passive attacks are detailed through optical reverse engineering and various side channel analysis methods, while active attacks are discussed with special emphasis on fault injection, Focused Ion Beams and hardware Trojans. The very powerful passive and active combined attack (PACA) type is introduced through the practical example of RSA implementations. Discussion of logical attacks not only covers practical attacks against specific cryptographic algorithm implementations, but also the relevant programming bugs and mitigation techniques like buffer overflow or integer problems are introduced.







There are no prerequisites for this course.

Developers, architect and testers of secure hardware components. 

  • Understand basic concepts of security, IT security and secure coding
  • Have a practical understanding of cryptography
  • Understand the requirements of secure communication
  • Understand essential security protocols
  • Understand some recent attacks against cryptosystems

  • IT security and secure coding
  • Requirements of secure communication
  • Practical cryptography
  • Security protocols
  • Simple physical attacks and protections
  • Passive physical attacks
  • Active physical attacks
  • Passive and active combined attacks
  • Special security functions – Requirements and solutions
  • Principles of security and secure coding


Contact us for more detail about our trainings and for all other enquiries!

Upcoming Trainings

Join our public courses in our Sweden facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

Classroom / Virtual Classroom
02 borgemánnu 2024
Stockholm, Malmö, Göteborg
3 Days
Classroom / Virtual Classroom
12 borgemánnu 2024
Stockholm, Malmö, Göteborg
3 Days
Classroom / Virtual Classroom
14 borgemánnu 2024
Stockholm, Malmö, Göteborg
3 Days
Classroom / Virtual Classroom
04 čakčamánnu 2024
Stockholm, Malmö, Göteborg
3 Days
Classroom / Virtual Classroom
07 čakčamánnu 2024
Stockholm, Malmö, Göteborg
3 Days
Classroom / Virtual Classroom
10 čakčamánnu 2024
Stockholm, Malmö, Göteborg
3 Days
Classroom / Virtual Classroom
14 čakčamánnu 2024
Stockholm, Malmö, Göteborg
3 Days
Classroom / Virtual Classroom
18 čakčamánnu 2024
Stockholm, Malmö, Göteborg
3 Days
Crypto Chip-Set Security Training Course in Sweden

Sweden is a Nordic country that borders Norway, Finland and Denmark. The name "Sweden" originated from the "Svear", a people mentioned by the Roman author Tacitus. While being the largest Nordic country, Sweden is the fifth-largest country in Europe. Sweden has a total population of 10.4 million. The capital and largest city is Stockholm. About 15 percent of the country lies within the Arctic Circle, so that's why from May until mid-July, sunlight lasts all day in the north of the Arctic Circle. On the other hand, during December, the capital citt experiences only about 5.5 hours of daylight.

When in Sweden, visiting Stockholm's Old Town Gamla Stan, Sweden's most popular museum Vasa Museum and a UNESCO World Heritage Site; Drottningholm Palace is highly recommended.

Empower yourself with our extensive selection of IT courses, covering programming, data analytics, software development, business skills, cloud computing, cybersecurity, project management. Experience personalized training and expert guidance from our instructors, who will come to your chosen training venue anywhere in Sweden.
By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.