Full Training Programs
Free Online Training Events
Free Technical Resources
PLEASE NOTE: This is a LIVE INSTRUCTOR-LED training event delivered ONLINE. Please note for this course, daily sessions are up to 7 hours including breaks.
This course is designed for engineers developing software for platforms based around the Arm® Cortex®-M23 processor. The course includes an introduction to the Arm product range and supporting IP, the Cortex-M23 core, programmers' model, TrustZone-M security features, instruction set and debug architecture, compilers/linker tools. The course includes a number of hands-on practical exercises covering both assembly and C programming to reinforce the lecture material.
This course is designed for software engineers writing application and system software for platforms using the Cortex-M23 processor.
This class is based on source training material developed by Arm themselves, augmented with supplemental content and labs developed by Doulos. Doulos is a global Arm Approved Training Center.
The tool-chain required for the exercises are provided within a self-contained virtual machine. The student is only required to install the VirtualBox software on her/his Windows/Linux/Mac host machine. The remaining tools and exercises files are pre-configured and located inside the Virtual Machine to be run locally. The VM can be used for day do day embedded software development and allows the student to continue or redo his exercises even after the course has ended.
The exercises are designed to run on the provided NUCLEO STM32L552 board. This board is kept by the student at the end of the class.
The exercises cover a large spectrum of topics amongst those:
The security related hands-on exercises are:
Part 1: Tool Flow
Part 2: Security Attribution Unit Configuration
Part 3: Configuring the non-secure world
Part 4: Transition to the non-secure world
Part 5: Using Arm cmse attributes for non-secure calls
Part 6: Using Arm cmse attributes for secure calls
Part 7: Identifying the source of a function call
Part 8: Checking a data array address range
Part 9: Accessing secure data from a non-secure application
Part 10: Illegal access to a secure function from the non secure word
Complete an enquiry form and a Doulos representative will get back to you.
Enquiry FormPrice on request