PLEASE NOTE: This is a LIVE INSTRUCTOR-LED training event delivered ONLINE.
This course is designed for engineers developing software for platforms based around the Arm® Cortex®-M23 processor. The course includes an introduction to the Arm product range and supporting IP, the Cortex-M23 core, programmers' model, TrustZone-M security features, instruction set and debug architecture, compilers/linker tools. The course includes a number of hands-on practical exercises covering both assembly and C programming to reinforce the lecture material.
This course is designed for software engineers writing application and system software for platforms using the Cortex-M23 processor.
Doulos training materials are renowned for being the most comprehensive and user-friendly available. Their style, content and coverage are unique in the Embedded Systems training world, and have made them sought after resources in their own right. The materials include:
The training materials for this class are based on Arm's own material and supplemented by Doulos’ own lecture modules and hands-on exercises to provide students with the most practical and thorough information to achieve a well-rounded knowledge of the subject. Doulos is a global Arm Approved Training Partner.
The tool-chain required for the exercises are provided within a self-contained virtual machine. The student is only required to install the VirtualBox software on her/his Windows/Linux/Mac host machine. The remaining tools and exercises files are pre-configured and located inside the Virtual Machine to be run locally. The VM can be used for day do day embedded software development and allows the student to continue or redo his exercises even after the course has ended.
The exercises are designed to run on the provided NUCLEO STM32L552 board. This board is kept by the student at the end of the class.
The exercises cover a large spectrum of topics amongst those:
The security related hands-on exercises are:
Part 1: Tool Flow
Part 2: Security Attribution Unit Configuration
Part 3: Configuring the non-secure world
Part 4: Transition to the non-secure world
Part 5: Using Arm cmse attributes for non-secure calls
Part 6: Using Arm cmse attributes for secure calls
Part 7: Identifying the source of a function call
Part 8: Checking a data array address range
Part 9: Accessing secure data from a non-secure application
Part 10: Illegal access to a secure function from the non secure word
Complete an enquiry form and a Doulos representative will get back to you.
Enquiry FormPrice on request