CANopen training
Implementation of the CANopen protocol.
At the end of this CANopen training, participants will not only have the necessary knowledge for the development of CAN/CANopen applications but also for the operational management of this field network.
Training objectives:
- Know the fundamentals of the CAN bus
- Know the CANopen messaging services
- Understand the principle of the object dictionary
- Implement the development of a CANopen network architecture
- Implement the management and configuration of the entire network in operation
- Implement a CANopen protocol through practical examples
- More details
EtherCAT training
This course is aimed at project managers, engineers, and technicians who may be required to start up, supervise, or participate in the development of applications based on EtherCAT technology.
Training objectives:
- Understand the fundamentals of industrial Ethernet networks and fieldbus
- Understand Ethernet technology
- Understand the fundamental and advanced principles of EtherCAT technology
- Apply problem-solving investigation techniques
- More details
81001-5-1 training
This training course introduces the cybersecurity approach applied to medical devices.
Training objectives:
- Understand cybersecurity in the medical ecosystem and the relevant regulatory requirements
- Conduct cybersecurity risk assessments
- Implement the requirements of the IEC 81001-5-1 standard
- Plan the details of the actions to be taken and the checks to be carried out for each part of the medical device life cycle
- Select the tools required to conduct code audits
- Plan the response to a cybersecurity incident
- More details
MISRA C training
Learn how to implement the MISRA C:2012 rules by combining theory and practice.
Training objectives:
- Raise awareness of the MISRA consortium and the MISRA C:2012 standard
- Implement the MISRA C:2012 rules through practical application
- Adopt secure C coding techniques
- More details
"Secure by Design" training
This training course covers not only the challenges, threats, standards, and requirements applicable to embedded systems, but also the various solutions and techniques that can be implemented to reduce risks in terms of coding, system architecture and communication, thereby improving the cybersecurity of the system.
Training objectives:
- Approach the design of new connected products and services with confidence
- Adapt protection measures to the context
- Position themselves within a ‘Secure by Design’ approach
- More details
| Languages | English, French |
| Delivery | Classroom, Online |
| Supported Devices | STM32 MCUs, STM32 MPUs |
| Location | France |
| Site |
| ST Products |
|---|