NEW: E-Learning-Package for Onboarding of Embedded Software Developers

Product type

NEW: E-Learning-Package for Onboarding of Embedded Software Developers

Eclipseina GmbH
Logo Eclipseina GmbH
Provider rating: starstarstarstarstar 10 Eclipseina GmbH has an average rating of 10 (out of 7 reviews)

Need more information? Get more details on the site of the provider.

Description

NEW: E-Learning-Package for Onboarding of Embedded Software Developers

DESCRIPTION

Benefit from structured high-quality training in the field of embedded software development.

With the package of e-learning courses, you benefit from didactically excellently designed specialist topics on software development for embedded systems including, serial bus systems, operating system, real-time operating systems as well as information security and encryption methods.

TARGET GROUP

The program is aimed at all those getting started or being involved in the development of embedded software.

Developers, engineers, software engineers and software project managers

PREREQUISITES

No special techni…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

NEW: E-Learning-Package for Onboarding of Embedded Software Developers

DESCRIPTION

Benefit from structured high-quality training in the field of embedded software development.

With the package of e-learning courses, you benefit from didactically excellently designed specialist topics on software development for embedded systems including, serial bus systems, operating system, real-time operating systems as well as information security and encryption methods.

TARGET GROUP

The program is aimed at all those getting started or being involved in the development of embedded software.

Developers, engineers, software engineers and software project managers

PREREQUISITES

No special technical knowledge is required. However, depending on the depth of your previous knowledge, you should allow more time for learning.

DURATION

Continuous training over a period of 📅 12 weeks

CERTIFICATE OF ATTENDANCE

You will receive a certificate for each completed e-learning course within the overall package. The respective certificate can be downloaded from the website after completion of each course.

AGENDA

We recommend continuous training in the following sequence:

  • Module 1: Embedded Software Basics
  • Module 2: Serial Bus Systems
  • Module 3: Cyclic Redundancy Check CRC
  • Module 4: Operating System OS
  • Module 5: Real-Time Operating System RTOS
  • Module 6: Information Security
  • Module 7: Cryptography

CONTENT OF THE MODULES IN DETAIL

The training is composed of several e-learning courses. The following courses are included in this package:

Module 1: Embedded Software Basics

Content: 1 hour and 15 minutes, estimated study time: 6 hours and 15 minutes

Fixed Point Arithmetic

  • Storage of numbers in memory
  • Value range and accuracy
  • Error possibilities
  • Mathematical representation and conversion
  • Arithmetic operations
  • Advantages and disadvantages of fixed point arithmetic

Floating Point Arithmetic

  • Exponential representation
  • Single and double
  • Storage of numbers in memory
  • Value range
  • Error possibilities and exceptions
  • Advantages and disadvantages fixed point arithmetic

Module 2: Introduction to Serial Bus Systems

Content: 2 hours and 50 minutes, estimated study time: 6 hours and 15 minutes

Basic Terms

  • Motivation (the term bus, typical applications, real time, serial vs. parallel transmission).
  • Transmission path (simplex/duplex, bit rate, baud rate, clock signal, communication models, latency, payload and control data)
    protocol (structure, principles, protocol stack)
  • System components (router, gateway, switch and repeater)

OSI-Model

  • Motivation, mode of operation and basic model structure
  • Transport-oriented layers and their tasks
  • Application-oriented layers and their tasks

Physical Layer

  • Different types of transmission media
  • Basic structure and examples of connectors
  • Binary representation (endianness, bit significance and different codings)

Data Link Layer

  • Communication Process: synchronous and asynchronous serial communication, routing schemes, topologies
  • Possibilities for secure data transmission, e.g. parity bit
  • Different access control methods

CRC Basics

  • Usage and definition
  • Explanation of the generator polynomial
  • Calculation of the CRC using two examples

Module 3: Cyclic Redundancy Check CRC

Content: 1 hour and 20 minutes, estimated study time: 6 hours and 40 minutes

CRC Definition

  • Meaning of the term CRC
  • Benefits and use cases of CRC
  • Different lengths of CRC
  • Principle: Basic operation, polynomial representation, generator polynomial
  • Illustration of the functioning by means of an example with CRC-5

CRC-8

  • Calculation of the CRC-8 with two examples
  • Generating the CRC-8 on the sender side
  • CRC at receiver side: calculations if message is correct or incorrect
  • First example: Message with one byte
  • Second example: Message with two bytes

CRC-16

  • Two examples
  • Generating the CRC-16 on the transmitter side
  • CRC-16 at the receiver
  • First example: Message with two bytes
  • Second example: Message with three bytes

Module 4: Operating System OS

Content: 55 minutes, estimated study time: 4 hours and 35 minutes

  • General Introduction
  • Kernel
  • Multitasking
  • Safety and other Advanced Aspects
  • Embedded OS

Module 5: Real-Time Operating System

Content: 1 hour and 5 minutes, estimated study time: 5 hours and 25 minutes

  • General Introduction
  • Revision
  • Characteristics
  • Tasks
  • Scheduling
  • Typical Problems

Module 6: Information Security

Content: 1 hour, estimated study time: 5 hours

Introduction

  • Goals of Information Security
  • Extent of Information Security

Practical Realisation

  • Threats
  • Hazards
  • Practical Implentation of Information Security

Endangerments

  • Basics
  • Functionality

Module 7: Cryptography

Content: 4 hours, estimated study time: 20 hours

Classical Cryptography

  • Cryptography Basics
  • Scytale
  • Caesar Cipher
  • Vigenère Cipher
  • One-Time Pad
  • Enigma

Modern Cryptography

  • Who are Alice and Bob?
  • Symmetric Encryption
  • Asymmetric Encryption
  • Hybrid Encryption
  • DES (Data Encryption Standard)
  • AES (Advanced Encryption Standard)
  • Diffie-Hellman Key Exchange
  • RSA
There are no reviews yet.

Share your review

Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.