Your browser is not optimized for viewing this website.

More information »


GRIMM's Defensive Automotive Engineering Security Training

with CyPhy Team


NOTE: This course requires 10 attendees to be held. If we do not reach this amount, all registration fees will be refunded. 

Course Description

In this course, participants will gain a practical understanding of the automotive cybersecurity threat landscape from an attacker’s perspective. Automotive-specific vulnerabilities will focus on exploitation and attack techniques to better inform security in code design and development. Attendees will participate in extensive hands-on offensive exercises in a lab environment in addition to traditional course lectures. These exercises expose each student to real-world exploitation methods and enable a richer experience that gives real-world context and understanding of the threat environment. After course completion, participants will have enhanced their ability to integrate cyber security into vehicle-centric systems and networks.

Course Objectives

This 5-day course will expose each student to the attacker’s perspective of automotive security. Each day the student will have hands-on labs to complement that day’s lecture. During the course, students will learn to develop strategies for minimizing attack surfaces and creating designs more resistant to attack and compromise.

Building on real-world examples, students will gain hands-on experience and technical details of many current, real-world security problems -- and how to detect, avoid, and fix them, including basic Hardware and Software Reverse Engineering.

Day 1:

●  Approach to Secure Design Thinking.

●  CAN Tools and Low-Level Interactions


●  ISO-TP Details

Day 2:

●  Interactive UDS

●  J2534, Software Updates, and ECU Configuration

●  Introduction to Hardware Reverse Engineering

●  Remote Code Execution

Day 3:

●  FlexRay, LIN, and other modern communication Details

●  Infotainment Flaws and Remedies

●  Telematics Attack Surface and Current Design Flaws

Day 4:

●  J1939 and CAN

●  Supply Chain Woes and Guidance

●  Automotive Risk Assessment

●  Remote Keyless Entry and Passive/Proximity Key Problems

●  Introduction to Software Reverse Engineering

Day 5:

●  Vehicle to Everything (V2X) Attack Surface and Methods

●  Automotive Ethernet

●  Capture The Flag!

Who Should Attend: 

Note: GRIMM’s trainers strive to accommodate students with all levels of technical knowledge. However, students with some technical background, understanding of automotive technologies, and programming language(s) will excel at the hands-on lab activities incorporated into the course.


Students need to bring a laptop capable of running the VirtualBox x86 virtualization software as Local Admin (Windows/Linux/Mac x86; no Chromebooks or Apple Silicon).

All other necessary materials will be provided by GRIMM.

  • Feb 6 - 10th, 2023
    Mon - Fri from 9:00 am - 5:00 pm

4099 Cedar Commercial Dr NE, Cedar Springs, MI 49319, USA

4099 Cedar Commercial Dr NE
Cedar Springs, MI 49319 Get directions

Location map for 4099 Cedar Commercial Dr NE, Cedar Springs, MI 49319, USA

Forgot password?
Staff Log In