This course explores the essential principles and strategies behind securing embedded Linux systems, a critical capability in today’s connected and increasingly vulnerable technology landscape. You’ll learn how thoughtful security design influences resilience, reliability, and long-term product success.
抓住节省的机会!购买 Coursera Plus 3 个月课程可享受40% 的折扣,并可完全访问数千门课程。

推荐体验
推荐体验
中级
Embedded developers or engineers with basic Linux knowledge seeking stronger security skills.
推荐体验
推荐体验
中级
Embedded developers or engineers with basic Linux knowledge seeking stronger security skills.
您将学到什么
Determine the optimal hardware platform based on design criteria.
Implement security by design in embedded systems.
Integrate advanced security measures like TPM, LUKS, and Secure Boot.
您将获得的技能
- Embedded Systems
- Hardening
- Computer Hardware
- Federal Information Security Management Act
- Data Storage Technologies
- Secure Coding
- Security Controls
- Security Engineering
- Hardware Architecture
- Cybersecurity
- Information Systems Security
- Infrastructure Security
- Threat Modeling
- Security Strategy
- Application Security
- Encryption
- System Configuration
- Network Security
您将学习的工具
要了解的详细信息

添加到您的领英档案
January 2026
14 项作业
了解顶级公司的员工如何掌握热门技能

该课程共有14个模块
In this section, we learn about Linux-embedded systems, how they are used and why they are important.
涵盖的内容
2个视频3篇阅读材料1个作业
2个视频• 总计2分钟
- Course Overview• 1分钟
- Welcome to the Cyber Security Landscape - Overview Video• 1分钟
3篇阅读材料• 总计20分钟
- Introduction• 5分钟
- How Are Linux-Embedded Systems Used• 10分钟
- Why Is Securing Linux-Embedded Systems So Important• 5分钟
1个作业• 总计10分钟
- Navigating the Cyber Security Landscape• 10分钟
In this section, we explore embedding security in the design phase of product development, analyzing compliance standards like HIPAA and FISMA, and planning support strategies for appliance solutions. Key concepts include addressing business needs, identifying target users and buyers, and ensuring compliance with government and industry regulations to create secure, sustainable, and user-friendly products.
涵盖的内容
1个视频6篇阅读材料1个作业
1个视频• 总计1分钟
- Security Starts at the Design Table - Overview Video• 1分钟
6篇阅读材料• 总计65分钟
- Introduction• 5分钟
- What Are the Business Needs That the Solution Caters To• 10分钟
- The Target User• 10分钟
- Financial Services Systems• 10分钟
- Non-US Government Cybersecurity Agencies• 10分钟
- No Support/Self-Support• 20分钟
1个作业• 总计10分钟
- Security Design and Compliance Fundamentals• 10分钟
In this section, we explore hardware selection criteria for embedded Linux systems, focusing on performance, environmental constraints, and security. Key concepts include evaluating COTS and custom hardware, understanding CPU/VCPU requirements, and addressing vulnerabilities like Meltdown and Spectre. The section guides teams in aligning hardware choices with project goals, ensuring scalability, and considering both physical and virtual appliance needs.
涵盖的内容
1个视频6篇阅读材料1个作业
1个视频• 总计1分钟
- Applying Design Requirements Criteria for Hardware Selection - Overview Video• 1分钟
6篇阅读材料• 总计55分钟
- Introduction• 10分钟
- CPU/VCPU• 10分钟
- Non-Volatile Memory Express• 5分钟
- Custom Hardware and Peripherals• 10分钟
- Climate Control• 10分钟
- What Mainstream CPU/Hardware Platforms Are Available?• 10分钟
1个作业• 总计10分钟
- Evaluating Hardware Choices for System Design• 10分钟
In this section, we explore how to select the right Linux operating system based on hardware compatibility, driver support, and long-term stability. Key concepts include evaluating enterprise versus community distributions, understanding lifecycle management, and balancing hard and soft costs for optimal system reliability and cost efficiency.
涵盖的内容
1个视频3篇阅读材料1个作业
1个视频• 总计1分钟
- Applying Design Requirements Criteria for the Operating System - Overview Video• 1分钟
3篇阅读材料• 总计30分钟
- Introduction• 10分钟
- ARM• 10分钟
- Lifecycle of Operating Systems vs Your Solution• 10分钟
1个作业• 总计10分钟
- Operating System Design and Implementation Considerations• 10分钟
In this section, we explore secure build chain practices using DNF and RPM, emphasizing automation, tool integration, and security scanning for software supply chain control. Key concepts include source code control, compliance systems, and update mechanisms, with practical applications in testing, remediation, and repository management.
涵盖的内容
1个视频4篇阅读材料1个作业
1个视频• 总计1分钟
- Basic Needs in My Build Chain - Overview Video• 1分钟
4篇阅读材料• 总计80分钟
- Introduction• 10分钟
- Security Scanning, Testing, and Remediation• 20分钟
- Manifest and Configuration Tracking• 20分钟
- Update Control Mechanisms• 30分钟
1个作业• 总计10分钟
- Foundations of Secure Software Development• 10分钟
In this section, we explore advanced LUKS configurations for secure storage, focusing on automated key handling via crypttab and secure keyfile management using chmod and restorecon. We analyze recovery options for encrypted volumes, emphasizing practical applications for enterprise-grade Linux systems.
涵盖的内容
1个视频1篇阅读材料1个作业
1个视频• 总计1分钟
- Disk Encryption - Overview Video• 1分钟
1篇阅读材料• 总计20分钟
- Disk Encryption - The Reading• 20分钟
1个作业• 总计10分钟
- Disk Encryption Fundamentals and Security Practices• 10分钟
In this section, we explore TPM 2.0's role in securing sensitive data through cryptographic storage and encrypted passphrase authentication. We demonstrate configuring TPM 2.0 with LUKS encryption, analyzing its reliability and usability in real-world scenarios to enhance system integrity and user experience.
涵盖的内容
1个视频2篇阅读材料1个作业
1个视频• 总计1分钟
- The Trusted Platform Module - Overview Video• 1分钟
2篇阅读材料• 总计20分钟
- Introduction• 10分钟
- Exercise Enabling TPM 2 in Conjunction With LUKS Encryption• 10分钟
1个作业• 总计10分钟
- Trusted Platform Module Fundamentals• 10分钟
In this section, we explore securing the boot process and firmware configurations to protect system integrity. We examine BIOS, UEFI, and secure boot mechanisms, focusing on mitigating boot-level threats and implementing firmware security controls. Key concepts include understanding firmware vulnerabilities, configuring secure boot settings, and balancing security with system manageability.
涵盖的内容
1个视频2篇阅读材料1个作业
1个视频• 总计1分钟
- Boot, BIOS, and Firmware Security - Overview Video• 1分钟
2篇阅读材料• 总计15分钟
- Introduction• 10分钟
- Possible Threats in Firmware• 5分钟
1个作业• 总计10分钟
- Boot, BIOS, and Firmware Security Fundamentals• 10分钟
In this section, we explore image-based Linux deployments using tools like bootc and rpm-ostree, focusing on their security benefits and limitations. We examine workflows for updating and rolling back changes, emphasizing practical applications in embedded systems and the importance of immutable infrastructure for reliability and security.
涵盖的内容
1个视频6篇阅读材料1个作业
1个视频• 总计1分钟
- Image-Based Deployments - Overview Video• 1分钟
6篇阅读材料• 总计90分钟
- Introduction• 10分钟
- Bootc and Bootable Container Images• 10分钟
- Limitations of Image-Based Deployments• 10分钟
- Updating and Rolling Back Changes• 20分钟
- Creating a Container File• 10分钟
- Creating an Installer• 30分钟
1个作业• 总计10分钟
- Image-Based Deployment Fundamentals• 10分钟
In this section, we explore methods to secure appliances by implementing hardware-level protections such as BIOS security and USB disablement, while also designing user interfaces that simplify configuration and enhance user experience. We focus on minimizing root access, restricting console interactions, and ensuring applications operate in isolated environments to prevent unauthorized modifications.
涵盖的内容
1个视频5篇阅读材料1个作业
1个视频• 总计1分钟
- Childproofing the Solution: Protection from the End-User and Their Environment - Overview Video• 1分钟
5篇阅读材料• 总计45分钟
- Introduction• 5分钟
- USB Disablement• 10分钟
- Minimizing Access to Root• 10分钟
- Building a UI to Simplify Configuration While Providing a Great User Experience (UX)• 10分钟
- Initial Config Web UI• 10分钟
1个作业• 总计10分钟
- Securing End-User and Environmental Interactions• 10分钟
In this section, we explore how to gather and apply threat data using NVD, CSRC, and community resources. We emphasize staying informed through security newsletters, APIs, and active participation in Linux security communities for better decision-making and proactive threat mitigation.
涵盖的内容
1个视频4篇阅读材料1个作业
1个视频• 总计1分钟
- Knowing the Threat Landscape - Staying Informed - Overview Video• 1分钟
4篇阅读材料• 总计40分钟
- Introduction• 10分钟
- Security Technical Implementation Guides (STIGs)• 10分钟
- Security User Groups• 10分钟
- Contribute to the Development Process• 10分钟
1个作业• 总计10分钟
- Staying Informed in the Threat Landscape• 10分钟
In this section, we explore practical methods to secure device communications using SSL certificates, firewalls, and bus analysis. Key concepts include configuring OpenSSL 3.x for secure connections, identifying vulnerabilities in USB and CAN buses, and implementing firewall rules to protect network interactions.
涵盖的内容
1个视频5篇阅读材料1个作业
1个视频• 总计1分钟
- Are My Devices' Communications and Interactions Secure? - Overview Video• 1分钟
5篇阅读材料• 总计70分钟
- Introduction• 10分钟
- USB Connectors• 10分钟
- The CAN Bus• 20分钟
- Adding a Certificate to Your Custom Repository Server• 20分钟
- Graphical UI-Based Tools• 10分钟
1个作业• 总计10分钟
- Securing Device Interactions and Communications• 10分钟
In this section, we explore how to apply government security standards like FIPS 140-3 and STIG using RHEL and OpenSCAP, focusing on practical compliance strategies for public sector systems. We cover implementing FIPS mode, designing SCAP profiles, and analyzing security policies with RHEL 9.oval.xml data to ensure systems meet strict security requirements.
涵盖的内容
1个视频5篇阅读材料1个作业
1个视频• 总计1分钟
- Applying Government Security Standards - System Hardening - Overview Video• 1分钟
5篇阅读材料• 总计55分钟
- Introduction• 5分钟
- Adherence to Key US Government Standards• 10分钟
- Enabling FIPS Mode in RHEL• 20分钟
- Example: Using the OpenSCAP Workbench• 10分钟
- Implementation as Part of Your Continuous Integration/Continuous Deployment (CI/CD) Process• 10分钟
1个作业• 总计10分钟
- Government Security Standards and System Hardening• 10分钟
In this section, we explore how to implement feedback loops using community insights, analyze user groups for actionable use cases, and design executive roundtables for strategic alignment. The focus is on leveraging continuous feedback from users, executives, and communities to refine product development and ensure alignment with real-world needs, driving long-term success and innovation.
涵盖的内容
1个视频3篇阅读材料1个作业
1个视频• 总计1分钟
- Customer and Community Feedback Loops - Overview Video• 1分钟
3篇阅读材料• 总计25分钟
- Introduction• 5分钟
- User Groups• 10分钟
- Community Feedback Loops• 10分钟
1个作业• 总计10分钟
- Feedback Loops and Community Engagement• 10分钟
位教师

提供方

提供方

Packt helps tech professionals put software to work by distilling and sharing the working knowledge of their peers. Packt is an established global technical learning content provider, founded in Birmingham, UK, with over twenty years of experience delivering premium, rich content from groundbreaking authors on a wide range of emerging and popular technologies.
从 Security 浏览更多内容
状态:免费试用免费试用课程
状态:免费试用免费试用课程

课程
状态:免费试用免费试用课程
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
常见问题
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
If you complete the course successfully, your electronic Course Certificate will be added to your Accomplishments page - from there, you can print your Course Certificate or add it to your LinkedIn profile.
This course is currently available only to learners who have paid or received financial aid, when available.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
更多问题
提供助学金,

