SEC6Embedded Security for NXP i.MX-based processors
|
Objectives
|
- Access to a Linux machine
- Access to a shared filesystem to save and share their work.
- PDF course material
- I.MX8mQEVK evaluation board
- Familiarity with computer architecture
- Programming skills: Some programming experience, particularly in C
- Knowledge of NXP Implementation and ARM implementations
- Basic understanding of Security Algorithms and Secure coding
- Basic knowledge about Communication and Network protocols
- Basic knowledge in Embedded Linux
- Any embedded systems engineer or technician with the above prerequisites.
- The prerequisites indicated above are assessed before the training by the technical supervision of the traineein his company, or by the trainee himself in the exceptional case of an individual trainee.
- Trainee progress is assessed in two different ways, depending on the course:
- For courses lending themselves to practical exercises, the results of the exercises are checked by the trainer while, if necessary, helping trainees to carry them out by providing additional details.
- Quizzes are offered at the end of sections that do not include practical exercises to verifythat the trainees have assimilated the points presented
- At the end of the training, each trainee receives a certificate attesting that they have successfully completed the course.
- In the event of a problem, discovered during the course, due to a lack of prerequisites by the trainee a different or additional training is offered to them, generally to reinforce their prerequisites,in agreement with their company manager if applicable.
Course Outline
- Overview of embedded security and its importance
- Threads and attack vectors specific to embedded systems
- Common attack vectors
- Malware and exploits
- Threat landscape for embedded systems
- NXP and security features
- i.MX Applications processors
- Layerscape processors
- ARM MCUs
- S32 Automotive platform
- QorIQ platform
- Secure coding practices
- Code reviews and audits
- Input validation and sanitization
- Memory management and buffer overflows
- Static and dynamic code analysis tools
- Using static analysis tools
- Using dynamic analysis tools
- Secure development lifecycle for i.MX NXP-based devices
- Requirements gathering and threat modeling
- Design and implementation
- Testing and validation
- Deployment and maintenance
| Exercise: | Using static and dynamic analysis tools to find vulnerabilities | |
- Secure boot on NXP Devices
- Introduction to secure boot
- Secure boot implementation
- Secure boot verification and toubleshooting
- Firmware protection on NXP devices
- Introduction to firmware protection
- Techniques for protecting firmware on NXP devices
- Implementation of firmware protection
- Hardware assisted security on NXP devices
- Introduction to hardware assisted security
- ARM security features
- Implementation of hardware assisted security
| Exercise: | Implementing secure boot on NXP iMX | |
- Network Architecture i.MX-based processors
- Overview of network communication protocols for embedded systems
- Secure communication protocols
- Designing a secure network architecture
- Transport Layer Security (TLS)
- Introduction to TLS and SSL
- Implementing TLS/SSL
- Secure communication using TLS/SSL
- IPSec and IKE
- IPSec Fundamentals
- IKE Fundamentals
- IPSec and IKE configuration on NXP devices
- Advanced IPSec and IKE topics
- WiFi security
- Overview of WiFi security mechanisms and standards
- Implementing secure WiFi communication
- Best practices
- Bluetooth and BLE Security
- Introduction
- Security Fundamentals
- Bluetooth Security on NXP Devices
- Advanced Bluetooth Security Topics
- Secure Ultra-wideband
- Introduction to Ultra-Wideband
- UWB security Fundamentals
- UWB security on NXP devices
- Advanced UWB Security Topics
- Introduction to IoT Security
- Unique security challenges faced by IoT devices
- Overview of the common attack vectors and threats faced by IoT devices
- IoT security best practices
- Securing IoT devices at the network layer
- IoT-specific network security protocols
- Access control and secure data transfer
- Overview of authentication and authorization mechanisms for IoT devices
- Discussion of secure data transfer protocols for IoT, such as MQTT and HTTPS
- The role of application-level encryption in securing IoT devices
- Introduction to firmware update and management
- Importance of firmware updates in maintaining the security of embedded systems
- Overview of firmware update methods including manual and over-the-air (OTA) updates
- Secure firmware update processes
- OTA update mechanisms
- Overview of OTA update mechanisms
- Implementing OTA updates, including server-side and device-side
- Best practices for OTA updates, including testing and deployment
More
To book a training session or for more information, please contact us on info@ac6-training.com.
Registrations are accepted till one week before the start date for scheduled classes. For late registrations, please consult us.
You can also fill and send us the registration form
This course can be provided either remotely, in our Paris training center or worldwide on your premises.
Scheduled classes are confirmed as soon as there is two confirmed bookings. Bookings are accepted until 1 week before the course start.
Last update of course schedule: 23 February 2026
Booking one of our trainings is subject to our General Terms of Sales
Related Courses
C1
Effective MISRA C
C2
MISRA Compliance for Project Managers
SEC1
Developing C/C++ Secure Embedded Systems
SEC10
Cyber Resilience Act (CRA) Compliance for Embedded Systems
SEC11
NIS2 for Embedded
SEC12
Comprehensive Secure Systems Programming
SEC2
Advanced Embedded Systems Security
SEC7
ARM TrustZone for Cortex-M based devices
SEC8
Secured Embedded Linux Platform Build
SEC9
Advanced Embedded Linux Security