This class will provide an overview introduction of i.MX RT series, including their key features and key peripherals. This session also explores the design and implementation of a secure boot by making use and protect against firmware attacks. Secure designs begin with a security model consisting of policies, an understanding of the threat landscape and the methods used to enforce physical and logical security. To protect firmware execution given today’s threat landscape, there must be a policy to only allow execution of authenticated firmware. The methods used to enforce this policy rely on MCU security technology to create a protected boot flow. The boot firmware can contain public key cryptography to authenticate application code.