Packt

The Embedded Linux Security Handbook

Packt

The Embedded Linux Security Handbook

访问权限由 Coursera Learning Team 提供

深入了解一个主题并学习基础知识。
中级 等级

推荐体验

1 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度
深入了解一个主题并学习基础知识。
中级 等级

推荐体验

1 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度

您将学到什么

  • Determine the optimal hardware platform based on design criteria.

  • Implement security by design in embedded systems.

  • Integrate advanced security measures like TPM, LUKS, and Secure Boot.

要了解的详细信息

可分享的证书

添加到您的领英档案

作业

14 项作业

授课语言:英语(English)
最近已更新!

January 2026

了解顶级公司的员工如何掌握热门技能

Petrobras, TATA, Danone, Capgemini, P&G 和 L'Oreal 的徽标

该课程共有14个模块

In this section, we learn about Linux-embedded systems, how they are used and why they are important.

涵盖的内容

2个视频3篇阅读材料1个作业

In this section, we explore embedding security in the design phase of product development, analyzing compliance standards like HIPAA and FISMA, and planning support strategies for appliance solutions. Key concepts include addressing business needs, identifying target users and buyers, and ensuring compliance with government and industry regulations to create secure, sustainable, and user-friendly products.

涵盖的内容

1个视频6篇阅读材料1个作业

In this section, we explore hardware selection criteria for embedded Linux systems, focusing on performance, environmental constraints, and security. Key concepts include evaluating COTS and custom hardware, understanding CPU/VCPU requirements, and addressing vulnerabilities like Meltdown and Spectre. The section guides teams in aligning hardware choices with project goals, ensuring scalability, and considering both physical and virtual appliance needs.

涵盖的内容

1个视频6篇阅读材料1个作业

In this section, we explore how to select the right Linux operating system based on hardware compatibility, driver support, and long-term stability. Key concepts include evaluating enterprise versus community distributions, understanding lifecycle management, and balancing hard and soft costs for optimal system reliability and cost efficiency.

涵盖的内容

1个视频3篇阅读材料1个作业

In this section, we explore secure build chain practices using DNF and RPM, emphasizing automation, tool integration, and security scanning for software supply chain control. Key concepts include source code control, compliance systems, and update mechanisms, with practical applications in testing, remediation, and repository management.

涵盖的内容

1个视频4篇阅读材料1个作业

In this section, we explore advanced LUKS configurations for secure storage, focusing on automated key handling via crypttab and secure keyfile management using chmod and restorecon. We analyze recovery options for encrypted volumes, emphasizing practical applications for enterprise-grade Linux systems.

涵盖的内容

1个视频1篇阅读材料1个作业

In this section, we explore TPM 2.0's role in securing sensitive data through cryptographic storage and encrypted passphrase authentication. We demonstrate configuring TPM 2.0 with LUKS encryption, analyzing its reliability and usability in real-world scenarios to enhance system integrity and user experience.

涵盖的内容

1个视频2篇阅读材料1个作业

In this section, we explore securing the boot process and firmware configurations to protect system integrity. We examine BIOS, UEFI, and secure boot mechanisms, focusing on mitigating boot-level threats and implementing firmware security controls. Key concepts include understanding firmware vulnerabilities, configuring secure boot settings, and balancing security with system manageability.

涵盖的内容

1个视频2篇阅读材料1个作业

In this section, we explore image-based Linux deployments using tools like bootc and rpm-ostree, focusing on their security benefits and limitations. We examine workflows for updating and rolling back changes, emphasizing practical applications in embedded systems and the importance of immutable infrastructure for reliability and security.

涵盖的内容

1个视频6篇阅读材料1个作业

In this section, we explore methods to secure appliances by implementing hardware-level protections such as BIOS security and USB disablement, while also designing user interfaces that simplify configuration and enhance user experience. We focus on minimizing root access, restricting console interactions, and ensuring applications operate in isolated environments to prevent unauthorized modifications.

涵盖的内容

1个视频5篇阅读材料1个作业

In this section, we explore how to gather and apply threat data using NVD, CSRC, and community resources. We emphasize staying informed through security newsletters, APIs, and active participation in Linux security communities for better decision-making and proactive threat mitigation.

涵盖的内容

1个视频4篇阅读材料1个作业

In this section, we explore practical methods to secure device communications using SSL certificates, firewalls, and bus analysis. Key concepts include configuring OpenSSL 3.x for secure connections, identifying vulnerabilities in USB and CAN buses, and implementing firewall rules to protect network interactions.

涵盖的内容

1个视频5篇阅读材料1个作业

In this section, we explore how to apply government security standards like FIPS 140-3 and STIG using RHEL and OpenSCAP, focusing on practical compliance strategies for public sector systems. We cover implementing FIPS mode, designing SCAP profiles, and analyzing security policies with RHEL 9.oval.xml data to ensure systems meet strict security requirements.

涵盖的内容

1个视频5篇阅读材料1个作业

In this section, we explore how to implement feedback loops using community insights, analyze user groups for actionable use cases, and design executive roundtables for strategic alignment. The focus is on leveraging continuous feedback from users, executives, and communities to refine product development and ensure alignment with real-world needs, driving long-term success and innovation.

涵盖的内容

1个视频3篇阅读材料1个作业

位教师

Packt - Course Instructors
Packt
1,542 门课程 412,204 名学生

提供方

Packt

人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

自 2018开始学习的学生
''能够按照自己的速度和节奏学习课程是一次很棒的经历。只要符合自己的时间表和心情,我就可以学习。'

Jennifer J.

自 2020开始学习的学生
''我直接将从课程中学到的概念和技能应用到一个令人兴奋的新工作项目中。'

Larry W.

自 2021开始学习的学生
''如果我的大学不提供我需要的主题课程,Coursera 便是最好的去处之一。'

Chaitanya A.

''学习不仅仅是在工作中做的更好:它远不止于此。Coursera 让我无限制地学习。'

从 Information Technology 浏览更多内容