Cryptography and secure communications with MbedTLS
Dive into the world of cybersecurity with our intensive one-day course, designed to provide a comprehensive introduction to cryptographic fundamentals using the open-source mbedTLS library. This course will guide you through cryptographic primitives including Public Key Cryptography and the Public Key Infrastructure. We'll explore the pivotal role of the Transport Layer Security Protocol in establishing secure communications, ensuring a strong foundation in one of the most critical aspects of modern cybersecurity.
As we progress, the course will delve into the protocols pivotal to IoT systems, including MQTT, JSON, and CBOR. Throughout the course the emphasis is on hands-on learning; participants will engage in practical exercises using Cortex-M based microcontrollers. This course is an essential stepping stone for anyone aspiring to master the essentials of cybersecurity in today's interconnected world.
In this one-day course, we will introduce the skills and techniques required to defend your IoT devices against software attacks. This course starts by demonstrating the potential risks and how attackers can seize control of devices and systems. We'll delve into the world of Threat Modelling, a crucial technique for identifying and countering possible attack vectors.
Our focus then shifts to the PSA Security Model, a cornerstone in IoT device security. A highlight of this model is its system partitioning approach, a method that distinctly separates application firmware from secure services and data. You'll gain an in-depth understanding of how this is accomplished using Arm TrustZone for Cortex-M, paired with the practical application of the CMSIS Zone Utility for configuring complex memory maps.
Diving deeper, we'll explore the architecture of the Arm PSA Trusted Firmware for Cortex-M software, learning how to leverage its security services, including cryptography, secure storage, event logging, and attestation. Understanding the necessity of firmware updates in any IoT system, we'll examine the integration of the mcuBoot bootloader in the TF-M firmware, guiding you through the process of preparing and signing update images.
Join us in this comprehensive course to master the art of securing IoT devices, where practical knowledge meets theoretical foundations, setting the stage for a future-proofed understanding of IoT security.