NEW: E-Learning-Package for Embedded Software Developer
Description
E-Learning-Package for Embedded Software Developer
Benefit from continuous education with high-quality training in the field of embedded software development.
With the package of e-learning courses, you benefit from didactically excellently designed specialist topics on software development for embedded systems including, serial bus systems, operating system, real-time operating systems as well as information security and encryption methods.
TARGET GROUP
The program is aimed at all those getting started or being involved in the development of embedded software.
Developers, engineers, software engineers and software project managers
PREREQUISITES
No special technical knowledge is r…
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
E-Learning-Package for Embedded Software Developer
Benefit from continuous education with high-quality training in the field of embedded software development.
With the package of e-learning courses, you benefit from didactically excellently designed specialist topics on software development for embedded systems including, serial bus systems, operating system, real-time operating systems as well as information security and encryption methods.
TARGET GROUP
The program is aimed at all those getting started or being involved in the development of embedded software.
Developers, engineers, software engineers and software project managers
PREREQUISITES
No special technical knowledge is required. However, depending on the depth of your previous knowledge, you should allow more time for learning.
DURATION
Continuous training over a period of 📅 12 weeks
CERTIFICATE OF ATTENDANCE
You will receive a certificate for each completed e-learning course within the overall package. The respective certificate can be downloaded from the website after completion of each course.
AGENDA
We recommend continuous training in the following sequence:
- Module 1: Embedded Software Basics
- Module 2: Serial Bus Systems
- Module 3: Cyclic Redundancy Check CRC
- Module 4: Operating System OS
- Module 5: Real-Time Operating System RTOS
- Module 6: Electronics and Electrical Fundamentals
- Module 7: Information Security
- Module 8: Cryptography
CONTENT OF THE MODULES IN DETAIL
The training is composed of several e-learning courses. The following courses are included in this package:
Module 1: Embedded Software Basics
Content: 1 hour and 15 minutes, estimated study time: 6 hours and 15 minutes
Fixed Point Arithmetic
- Storage of numbers in memory
- Value range and accuracy
- Error possibilities
- Mathematical representation and conversion
- Arithmetic operations
- Advantages and disadvantages of fixed point arithmetic
Floating Point Arithmetic
- Exponential representation
- Single and double
- Storage of numbers in memory
- Value range
- Error possibilities and exceptions
- Advantages and disadvantages fixed point arithmetic
Module 2: Introduction to Serial Bus Systems
Content: 2 hours and 50 minutes, estimated study time: 6 hours and 15 minutes
Basic Terms
- Motivation (the term bus, typical applications, real time, serial vs. parallel transmission).
- Transmission path (simplex/duplex, bit rate, baud rate, clock
signal, communication models, latency, payload and control
data)
protocol (structure, principles, protocol stack) - System components (router, gateway, switch and repeater)
OSI-Model
- Motivation, mode of operation and basic model structure
- Transport-oriented layers and their tasks
- Application-oriented layers and their tasks
Physical Layer
- Different types of transmission media
- Basic structure and examples of connectors
- Binary representation (endianness, bit significance and different codings)
Data Link Layer
- Communication Process: synchronous and asynchronous serial communication, routing schemes, topologies
- Possibilities for secure data transmission, e.g. parity bit
- Different access control methods
CRC Basics
- Usage and definition
- Explanation of the generator polynomial
- Calculation of the CRC using two examples
Module 3: Cyclic Redundancy Check CRC
Content: 1 hour and 20 minutes, estimated study time: 6 hours and 40 minutes
CRC Definition
- Meaning of the term CRC
- Benefits and use cases of CRC
- Different lengths of CRC
- Principle: Basic operation, polynomial representation, generator polynomial
- Illustration of the functioning by means of an example with CRC-5
CRC-8
- Calculation of the CRC-8 with two examples
- Generating the CRC-8 on the sender side
- CRC at receiver side: calculations if message is correct or incorrect
- First example: Message with one byte
- Second example: Message with two bytes
CRC-16
- Two examples
- Generating the CRC-16 on the transmitter side
- CRC-16 at the receiver
- First example: Message with two bytes
- Second example: Message with three bytes
Module 4: Operating System OS
Content: 55 minutes, estimated study time: 4 hours and 35 minutes
- General Introduction
- Kernel
- Multitasking
- Safety and other Advanced Aspects
- Embedded OS
Module 5: Real-Time Operating System
Content: 1 hour and 5 minutes, estimated study time: 5 hours and 25 minutes
- General Introduction
- Revision
- Characteristics
- Tasks
- Scheduling
- Typical Problems
Module 6: Electronics and Electrical Fundamentals
Content: 3 hours and 10 minutes, estimated study time: 15 hours and 50 minutes
- Electronics and Magnetism
- Important Components and Principles
- Circuits
- Alternating Current Circuits
- Basics of Power Electronics
Module 7: Information Security
Content: 1 hour, estimated study time: 5 hours
Introduction
- Goals of Information Security
- Extent of Information Security
Practical Realisation
- Threats
- Hazards
- Practical Implentation of Information Security
Endangerments
- Basics
- Functionality
Module 8: Cryptography
Content: 4 hours, estimated study time: 20 hours
Classical Cryptography
- Cryptography Basics
- Scytale
- Caesar Cipher
- Vigenère Cipher
- One-Time Pad
- Enigma
Modern Cryptography
- Who are Alice and Bob?
- Symmetric Encryption
- Asymmetric Encryption
- Hybrid Encryption
- DES (Data Encryption Standard)
- AES (Advanced Encryption Standard)
- Diffie-Hellman Key Exchange
- RSA
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.