Designing Secure Kinetis Microcontroller Solutions

Download curriculum

This course provides all necessary theoretical and practical know-how to protect and secure code & data within the Kinetis family, and guidelines to establish a secure channel between a Kinetis device and host for production by 3rd party.

The course provides an in-depth overview of the key points that a software developer has to take into his considerations while developing protected/secured software for embedded device.

The course also includes practical lab in which the software engineer can experience with the security features on Tower/Freedom evaluation boards.

The course starts with an overview of the security challenges and the impact of security breaches to businesses, application security, and attacks classification.

The course covers the Kinetis family security and Flash protection features such as backdoor key security, mass erase, Flash security, JTAG, EzPort and FlexBus impact from security, and Flash protection regions. In addition the course covers the MPU, anti-tamper capabilities, and the memory mapped acceleration unit (mmCAU) co-processor.

End-to-end secure channel is also covered in this course to help customers delivering their image to 3rd party for production without fearing that it will copied by competitors.

The lab demonstrates how to protect customer application in Flash from reverse engineering by 3rd party who burn the image during the production stage.

At the end of this course, the participant will enhance his understanding of the Kinetis architecture security features, the optional threats, and efficiently use the cryptographic co-processor, Flash security and protection features, and understanding of the security path from a microcontroller to host.

Course Duration: 1 day






1. Become familiar with security challenges in embedded devices
2. Become familiar  with the Kinetis family security software and hardware features
3. Protect Flash code and data from unauthorized accesses
4. Become familiar with mmCAU co-processor and DryIce
5. Use the MPU for software regions protection
6. Understand security configuration impact on debug and external bus capabilities
7. Understand the security requirements for keys and certificates for production
8. Become familiar with cryptographic algorithms and protocol standards






Software engineers who would like to add security and protection into their products, and understand how to configure their system in the most efficient way.

1. Hardware: K64 Tower evaluation board, K64 Freedom evaluation board, Keil/IAR debuggers, open SDA
2. Software: Keil MDK or IAR WorkBench
3. Course and lab books

Next course will be held on:
Please contact us