Introduction to Automotive Cybersecurity

Cybersecurity has become one of the most critical issues in developing autonomous and connected vehicles including vehicle to vehicle (V2V), vehicle to infrastructure (V2I), and vehicle to passenger (V2P) communications. 

This course has been developed for the Chinese auto industry to provide engineers and software developers involved in V2X and related industries with important knowledge about vehicle cybersecurity, including basic cybersecurity practices, interpretation of SAE J3061 standards, connected vehicle attack & defense approaches and the Security Development Lifecycle (SDL). The course also combines the development of advanced technologies of cybersecurity and the connected vehicle industry. 

What Will You Learn

By attending in this seminar, you will be able to:
  • Identify key concepts in automotive cybersecurity and its requirements
  • Identify SAE J3061 standards and relate them to your own development processes
  • Apply the Security Development Lifecycle
  • Explain the future progress of cybersecurity in automotive sector

Is This Course For You

System engineers, cybersecurity engineers, and software engineers from OEMs, Tier One suppliers and other organizations and research firms related to intelligent and connected vehicle development.  This course is also appropriate for both engineering staff and management looking to learn about the cybersecurity issues that affect all aspects of the automotive industry.

Materials Provided

This data is not available at this time

Course Requirements

This data is not available at this time


  • Basic security requirements and definition in automotive cybersecurity
    • Vehicle information and communication system architecture
    • Vulnerabilities
    • Analysis of the connected vehicle security requirements
    • Cybersecurity Definition
  • Vehicle R&D and production process in learning SAE J3061 standards
    • Security issues throughout the vehicle R&D, production, test and response cycles
    • Threats recognition and assessment
    • Risk control
    • Security technologies
  • Connected vehicle attack & defense exercise
    • System vulnerability analysis technologies
    • Protocol vulnerability analysis technologies
    • Vulnerability exploitation technologies
    • Defense technologies
  • Connected vehicle Security Development Lifecycle (SDL)
    • Software development process
    • Security issues
    • Security enhancement
    • Building the SDL