Rutgers Classifieds>Rutgers Online Courses>Development of Secure Embedded Systems

Development of Secure Embedded Systems

About this Specialization

Three people died after the crash landing of an Asiana Airlines aircraft from Seoul, Korea, at San Fransisco International Airport (SFO) on July 6, 2013. The American National Transportation Safety Board (NTSB) established that the crash most probably was caused by the flight crew\'s (in)actions. Three teenage girls lost their lives; two in the airplane and another was accidentally run over by a firetruck.\\n\\nThe human factor is often cause for accidents. NTSB and others report that more than 50 percent of plane crashes is caused by pilot error (and for road accidents it is even 90 perc.) Correctly designed safety and security critical systems can prevent these errors.\\n\\nAfter following this course successfully, you are able to develop secure embedded systems that are at the core of these safety and security critical systems. You are even challenged to program your own landing guiding system in our capstone project.\\n\\nIf you are interested in building secure embedded systems for the benefit of humanity, this specialization is for you!\\n\\nEIT Digital has chosen 3 MOOC topics of industrial interest, namely: 1) Embedded design and hardware, 2) Security in embedded connectivity and 3) Real-Time systems. These MOOCs show what it takes to program Internet-of-Things systems. We focus on tools used in the modern IoT industry, and we push for a practical learn-by-programming approach in which you are exposed to the actual development in an early stage.\\n\\nWe hope to see you soon!

Created by: EIT Digital


Related Online Courses

Spacecraft Dynamics and Control covers three core topic areas: the description of the motion and rates of motion of rigid bodies (Kinematics), developing the equations of motion that prediction the... more
This course introduces some of the fundamental principles of accessibility and prepares learners for further study in accessibility and inclusive design. Learners will have an opportunity to... more
Welcome to Cluster Analysis, Association Mining, and Model Evaluation. In this course we will begin with an exploration of cluster analysis and segmentation, and discuss how techniques such as... more
This course is the first of a series that aims to prepare you for a role working as an information technology professional. In this course, you will be introduced to the Linux operating system. You... more
The world of business strategy is in transition. What used to work doesn\'t anymore -- not necessarily. This course prepares you to think strategically in an age when companies like Apple, Google,... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL