TrustZone for Armv8-M

Course Objectives

This course provides information on how to design a secure IoT device using different Arm technologies including an Armv8-M processor with built-in security partitioning, TrustZone Cryptocell IP and techniques for developing software that is able to hide assets from attackers.
The training also covers how operating systems like RTX and mbedOS have been extended to provide a secure element capable of storing keys securely and executing crypto functions.
Workbooks are used to give trainees some practical experience on how to create secure and non-secure applications mapped appropriately to secure and non-secure memories, using secure APIs and TrustZone-aware compiler toolchain.

General Information


  • Knowledge of existing M-profile devices
  • Knowledge of programming in C
  • Experience of programming in assembler is useful but not essential
  • Some knowledge of embedded systems

Duration & Attendance

2 days (3 with hands-on labs)

Target Audience

Hardware, software and security system architects who need to understand the issues in developing trusted systems using Armv8-M TrustZone

Additional Information

Teaching Methods & Tools

  • Arm official course book
  • Arm official Workbook

Evaluation & Certification

At the end of the course the participant will receive a certificate from ARM.