ETSI Course

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

Disclaimer: The information contained in these documents and videos is confidential, privileged, and only for the intended recipient's information and may not be used otherwise as to their intended use and within the recipient's own department and may not be published or redistributed without the prior written consent of CCLab Ltd.The opinions and pieces of advice expressed are in good faith, and while every care has been taken in preparing these documents, CCLab Ltd. makes no representations and gives no warranties of whatever nature in respect of these documents and videos, including but not limited to the accuracy or completeness of any information or opinions or advice contained therein.CCLab Ltd and its employees and managers cannot be held liable for the use of and reliance on the opinions and advice in these documents."

Course overview

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

No items found.

Legislative overview

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

Legislative overview - RED

In this video we are presenting you the EU legislative overview, how the standards are in relationship with directives, and specifically why the standard ETSI EN 303 645 is currently the best choice for the conformity assessment of consumer IoT devices according to the EU Radio Equipment Directive (RED).

min
Legislative overview - PSTI

In this video we are presenting to you the relationship between the UK PSTI and ETSI EN 303 645.

min
Legislative overview - CLS

In this video we are presenting to you the relationship between the Singaporean Cybersecurity labelling Scheme (CLS) and ETSI EN 303 645.

min

Introduction to ETSI 303 645

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

ETSI INTRO

In this video, we are going to talk about the ETSI 303 645 standard. The goal of this video is to give an overview of the standard before jumping to the upcoming – and more detailed – lessons about the requirements.

min

Provision groups introduction

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

TSO INTRO

In this video we embark on a journey into the realm of technical excellence and support with the introduction of TSO, In the dynamic landscape of technology, where innovations and challenges coexist, having a support system.

min

Provision groups

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

TSO 5.1

During the video, we will review the following topics: Introduction to Test Scenario 5.1: No universal default passwords Presentation of the test groups and advices on compliance

min
TSO 5.2

"During the video, we will review the following topics: Introduction to Test Scenario 5.2: Implement a means to manage reports of vulnerabilities Presentation of the test groups and advices on compliance "

min
TSO 5.3

"During the video, we will review the following topics: Introduction to TEST SCENARIO 5.3: Keep software updated Presentation of the test groups and advices on compliance "

min
TSO 5.4

During the video, we will review the following topics: Introduction to Test Scenario 5.4: Securely store sensitive security parameters Presentation of the test groups and advices on compliance

min
TSO 5.5

During the video, we will review the following topics: Introduction to Test Scenario 5.5: Securely store sensitive security parameters Presentation of the test groups and advices on compliance

min
TSO 5.6

"During the video, we will review the following topics: Introduction to Test Scenario 5.6: Minimize exposed attack surfaces. Presentation of the test groups and advices on compliance"

min
TSO 5.7

During the video, we will review the following topics: Introduction to Test Scenario 5.7: Ensure software integrity. Presentation of the test groups and advices on compliance

min
TSO 5.8

During the video, we will review the following topics: Introduction to Test Scenario 5.8: Ensure that personal data is secure Presentation of the test groups and advices on compliance

min
TSO 5.9

During the video, we will review the following topics: Introduction to Test Scenario 5.9: Make systems resilient to outages Presentation of the test groups and advices on compliance

min
TSO 5.10

"During the video, we will review the following topics: Introduction to Test Scenario 5.10: Examine system telemetry data Presentation of the test group and advices on compliance "

min
TSO 5.11

During the video, we will review the following topics: Introduction to Test Scenario 5.11: Make it easy for users to delete user data Presentation of the test groups and advices on compliance

min
TSO 5.12

"During the video, we will review the following topics: Introduction to Test Scenario 5.12: Make installation and maintenance of devices easy Presentation of the test groups and advices on compliance "

min
TSO 5.13

During the video, we will review the following topics: Introduction to Test Scenario 5.13: Validate input data Presentation of the test group and advice on compliance

min
TSO 6

During the video, we will review the following topics: Introduction to Test Scenario 6.0: Data protection provisions for consumer IoT Presentation of the test groups and advices on compliance

min

How to fill out the ICS and IXIT

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

HOW TO FILL OUT THE ICS AND IXIT

"The purpose of this video is to discuss the important issues of IoT device security. As the title suggests, the intent of this presentation is to provide insight into the proper documentation (ICS, IXIT, DUT) required for compliance with the ETSI 303 645 standard. "

min

IXIT mapping

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

IXIT 1

During the video, we will cover the following topics: Presentation of IXIT 1 Presentation of IXIT 1 Authentication Mechanisms entries What are authentication mechanisms and how is it built?

min
IXIT 2

During the video, we will cover the following topics: Introduction to IXIT 2 Presentation of the IXIT 2 User Information entries What types of User Information exist?

min
IXIT 3

During the video, we will cover the following contents: Presentation of IXIT 3 Presentation of IXIT 3 Relevant Vulnerabilities entries What kind of vulnerabilities can arise?

min
IXIT 4

During the video, we will cover the following contents: Presentation of IXIT 4 Presentation of IXIT 4 Confirmations entries What confirmations exist in the standard?

min
IXIT 5

During the video, we will cover the following contents: Presentation of IXIT 5 Presentation of IXIT 5 Vulnerability Monitoring entries How are vulnerabilities monitored?

min
IXIT 6

During this video, we will cover the following contents: Presentation of IXIT 6 Presentation of IXIT 6 Software Components entries How is the system structured, what components does it consist of?

min
IXIT 7

During this video, we will cover the following contents: Presentation of IXIT 7 Presentation of IXIT 7 Update Mechanisms entries How does the update mechanism work?

min
IXIT 8

During this video, we will cover the following contents: Presentation of IXIT 8 Presentation of IXIT 8 Update Procedures entries What are update procedures?

min
IXIT 9

During this video, we will cover the following contents: Presentation of IXIT 9 Presentation of IXIT 9 Replacement Support entries What is replacement support?

min
IXIT 10

During this video, we will cover the following contents: Presentation of IXIT 10 Presentation of IXIT 10 Security Parameters entries How to handle the security parameter correctly?

min
IXIT 11

During this video, we will cover the following contents: Presentation of IXIT 11 Presentation of IXIT 11 Communication Mechanism entries How is the communication mechanism structured?

min
IXIT 12

During this video, we will cover the following contents: Presentation of IXIT 12 Presentation of IXIT 12 Network and Security Implementations entries What are security implementations?

min
IXIT 13

During this video, we will cover the following contents: Presentation of IXIT 13 Presentation of IXIT 13 Software Services entries What software components does the system use?

min
IXIT 14

During this video, we will cover the following contents: Presentation of IXIT 14 Presentation of IXIT 14 Secure Management Processes entries How do we manage critical security parameters?

min
IXIT 15

During this video, we will cover the following contents: Presentation of IXIT 15 Presentation of IXIT 15 Interfaces entries What are interfaces?

min
IXIT 16

During this video, we will cover the following contents: Presentation of IXIT 16 Presentation of IXIT 16 Code Minimization entries What is code minimization? How It Works?

min
IXIT 17

During this video, we will cover the following contents: Presentation of IXIT 17 Presentation of IXIT 17 Privilege Control entries Why is it important to create separate privilege levels?

min
IXIT 18

During this video, we will cover the following contents: Presentation of IXIT 18 Presentation of IXIT 18 Access Control entries What is access control?

min
IXIT 19

During this video, we will cover the following contents: Presentation of IXIT 19 Presentation of IXIT 19 Secure Development Processes entries How is secure development done?

min
IXIT 20

During this video, we will cover the following contents: Presentation of IXIT 20 Presentation of IXIT 20 Secure Boot Mechanisms entries Why is a secure boot important?

min
IXIT 21

During this video, we will cover the following contents: Presentation of IXIT 21 Presentation of IXIT 21 Personal Data entries How do handle personal data?

min
IXIT 22

During this video, we will cover the following contents: Presentation of IXIT 22 Presentation of IXIT 22 External Sensors entries What external sensors are there?

min
IXIT 23

During this video, we will cover the following contents: Presentation of IXIT 23 Presentation of IXIT 23 Resilience Mechanisms entries How can the DUT be resistant?

min
IXIT 24

During this video, we will cover the following contents: Presentation of IXIT 24 Presentation of IXIT 24 Telemetry Data entries Why is telemetry data important to the manufacturer?

min
IXIT 25

During this video, we will cover the following contents: Presentation of IXIT 25 Presentation of IXIT 25 Deletion Functionalities entries How can user data be deleted and why?

min
IXIT 26

During this video, we will cover the following contents: Presentation of IXIT 26 Presentation of IXIT 26 User Decisions entries What user choices can be made?

min
IXIT 27

During this video, we will cover the following contents: Presentation of IXIT 27 Presentation of IXIT 27 User Interfaces entries What user interfaces are there?

min
IXIT 28

During this video, we will cover the following contents: Presentation of IXIT 28 Presentation of IXIT 28 External APIs entries What External APIs exist, why are they useful?

min
IXIT 29

During this video, we will cover the following contents: Presentation of IXIT 29 Presentation of IXIT 29 Data Input Validation entries Why is it important to give a clean input to the DUT?

min