Embedded Device and RTOS Security
RCCE students will learn securing embedded devices and real-time operating systems used in industrial controllers, appliances, medical equipment, and mission-critical field systems. RCCE students will learn to assess constrained-device security models, identify insecure services and interfaces, evaluate update mechanisms, review memory protection limitations, and apply hardening strategies appropriate for embedded and real-time environments. The course covers practical scenarios ranging from embedded Linux platforms to RTOS-based systems operating in high-assurance environments. RCCE students will learn to analyze complex systems and think like an attacker to better defend the organization. This comprehensive course delivers practical knowledge applicable to real-world cybersecurity operations. Starting from foundational concepts, RCCE students will learn through a combination of concept explanation, practical demonstration, and hands-on exercises.
- Security Engineers building defensive controls
- Security Analysts and Blue Team members
- Systems Administrators with security responsibilities
- GRC and Risk Professionals supporting controls
- Professionals implementing Embedded Device and RTOS Security
- Explain Course Overview fundamentals
- Execute hands-on tasks for what you will learn
- Execute hands-on tasks for course structure — covering constrained-device security models, 5 sections covering embedded + RTOS.
- Execute hands-on tasks for apply rtos-specific hardening strategies — covering 5 sections covering embedded + RTOS.
- Execute hands-on tasks for embedded systems landscape
- Execute hands-on tasks for industrial controllers
- Execute hands-on tasks for medical devices — covering PLCs and RTUs in SCADA, Infusion pumps and monitors.
- Execute hands-on tasks for consumer & iot — covering PLCs and RTUs in SCADA.
- Execute hands-on tasks for what makes embedded different
- Execute hands-on tasks for constrained resources — covering Limited CPU, RAM, and storage.
- Execute hands-on tasks for operational constraints — covering 24/7 uptime requirements.
- Execute hands-on tasks for real-time operating systems fundamentals
| Module 01 | Course Overview |
| Module 02 | What You Will Learn |
| Module 03 | Course Structure |
| Module 04 | Apply RTOS-specific hardening strategies |
| Module 05 | Embedded Systems Landscape |
| Module 06 | Industrial Controllers |
| Module 07 | Medical Devices |
| Module 08 | Consumer & IoT |
| Module 09 | What Makes Embedded Different |
| Module 10 | Constrained Resources |
| Module 11 | Operational Constraints |
| Module 12 | Real-Time Operating Systems Fundamentals |
| Module 13 | Deterministic Scheduling |
| Module 14 | Memory Model |
All hands-on labs run on Rocheston Rose X OS. Students practice embedded device and rtos security by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.
- Lab 1: Explain Course Overview fundamentals
- Lab 2: Execute hands-on tasks for what you will learn
- Lab 3: Execute hands-on tasks for course structure
- Lab 4: Execute hands-on tasks for apply rtos-specific hardening strategies
- Lab 5: Execute hands-on tasks for embedded systems landscape
Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Embedded Device and RTOS Security, verifiable through the Rocheston certification portal.
- Full access to all course materials and slide decks
- Hands-on lab access on Rocheston Rose X OS environment
- Access to Rocheston CyberNotes
- Access to Rocheston Zelfire — EDR/XDR SIEM platform
- Access to Rocheston Raven — online cyber range exercise platform
- Access to Rocheston Vulnerability Vines AI