ARMv8-M Trust-Zone on Cortex-M33: Embedded Security
1 month ago
IT & Software
[100% OFF] ARMv8-M Trust-Zone on Cortex-M33: Embedded Security

Learn ARMv8-M TrustZone on Cortex-M33: Secure embedded systems application with ARM CMSIS, Keil MDK, and LPC55S69

2.8
99 students
6.5h total length
English
$0$44.99
100% OFF

Course Description

Learn how to secure modern embedded systems using ARMv8-M TrustZone on Cortex-M33 microcontrollers. This comprehensive course is designed for embedded developers, firmware engineers, and IoT professionals who want to implement trusted execution environments and achieve fine-grained security in ARM-based systems.

Using the powerful LPC55S69 MCU and tools like Keil MDK and CMSIS, you'll gain both theoretical understanding and practical skills to build, test, and debug TrustZone-enabled applications in C.

You’ll also learn how to analyze and debug security-critical code at both the C and assembly level, ensuring you understand exactly how transitions and isolations are handled at the hardware level.

What You Will Learn:

  • Overview of the ARMv8-M architecture and its key security enhancements

  • How TrustZone technology works on Cortex-M33 for embedded systems

  • Differences between Secure, Non-Secure, and Non-Secure Callable (NSC) states

  • Step-by-step setup of SAU (Security Attribution Unit) and IDAU

  • How to partition memory based on security attributes

  • Deep dive into new ARMv8-M instructions (SG, BLXNS, BXNS) for secure state switching

  • Handling Secure and Non-Secure interrupts and transitions safely

  • Practical C examples using CMSIS security macros and attributes

  • Building projects with Makefiles, running on Keil MDK and LPC55S69 MCU

  • Debugging embedded security labs at both C and assembly level

Overview of the ARMv8-M architecture and its key security enhancements

How TrustZone technology works on Cortex-M33 for embedded systems

Differences between Secure, Non-Secure, and Non-Secure Callable (NSC) states

Step-by-step setup of SAU (Security Attribution Unit) and IDAU

How to partition memory based on security attributes

Deep dive into new ARMv8-M instructions (SG, BLXNS, BXNS) for secure state switching

Handling Secure and Non-Secure interrupts and transitions safely

Practical C examples using CMSIS security macros and attributes

Building projects with Makefiles, running on Keil MDK and LPC55S69 MCU

Debugging embedded security labs at both C and assembly level

Tools & Technologies:

  • ARM Cortex-M33 (LPC55S69)

  • ARMv8-M TrustZone

  • CMSIS (Cortex Microcontroller Software Interface Standard)

  • Keil MDK (Arm Development Studio)

  • Makefile-based C projects

ARM Cortex-M33 (LPC55S69)

ARMv8-M TrustZone

CMSIS (Cortex Microcontroller Software Interface Standard)

Keil MDK (Arm Development Studio)

Makefile-based C projects

Who Should Take This Course:

  • Embedded systems developers looking to implement secure firmware

  • IoT engineers aiming to enforce hardware-level isolation

  • Firmware developers working with ARM Cortex-M33 or TrustZone

  • Anyone interested in learning about ARMv8-M security features

  • This is an advanced course, therefore you will need to have some experience on embeddd systems and ARM architecture

Embedded systems developers looking to implement secure firmware

IoT engineers aiming to enforce hardware-level isolation

Firmware developers working with ARM Cortex-M33 or TrustZone

Anyone interested in learning about ARMv8-M security features

This is an advanced course, therefore you will need to have some experience on embeddd systems and ARM architecture

By the end of this course, you’ll be able to confidently design, build, debug, and maintain secure embedded applications using ARM TrustZone, ensuring system integrity and protection in real-world environments.

Similar Courses