Let AI Lead the Way
To be frank with you, I am always a little skeptical with AI. For me it has not made that much of a difference in my work or my life (Apart from making an impressive linkedin profile photo...). But I've been curious as to how AI is at consolidating information. As I like to call it, AI, or LLMs specifically is nothing but a optimistic answering machine with a large resource pool. And I've been seeing a lot of instagram reels, where they basically make AI your coach, therapist, personal trainer and what have you. And, whilst I've been skeptical with these so called "prompts that the system doesn't want you to know", I was curious. So recently my manager told me to brush up on some competencies for my role as a lead engineer in embedded security, so I thought why not I just make a prompt to basically give me an entire syllabus to study on. I chose perplexity as it had the most robust web search function till date(I know chatGPT and Grok comes close, but they do hallucinate from time to time, something I have not experienced with perplexity), and whilst I was not blown away, I was surprised at the sheer volume of information that the LLM provided, and it gave it to me in a handy markdown file that I can conveniently paste here, so that I can refer to it, whenever and wherever. Before I show you the roadmap, here is the prompt I used. I redacted the information that I wanted, and formatted it in such a way that you can add your competencies and get a fairly comprehensive roadmap.
I am studying for an <Your desired role and domain>, following the <any specific industry standard, like IEC, NIST, etc>, My manager, wanting to help has given me some topics to learn on that will help me with my competencies. You, being an expert in <the key skills required, ex: embedded security, network security>, is giving me a full roadmap into how to get not just theoretical but hands on experience with these concepts, and provides me with free resources to learn these(cause I'm broke AF) Could you provide me with a detailed roadmap, with working resource links on how to study these concepts?
<Your desired Topics>
I prefer a mix of videos and documentation, plus some ways to get a hands on experience with these concepts, but the catch is all should be free. Prepare a detailed markdown document with all the links to the resources so that I can gain a fair bit of technical competency in these fields. Create a detailed documentation, with links so that I can refer and keep track easily, also give me a downloadable markdown file of the roadmap as well so that I can host it in my mkdocs blog.
And without further ado, here is the roadmap...
Embedded Cybersecurity Learning Roadmap: IEC-62443 Railway Industry
Target Role: Embedded Cybersecurity Engineer (Railway Industry)
Standard: IEC-62443 (Industrial Automation & Control Systems Cybersecurity)
Preparation Date: February 2026)
Learning Format: Video + Documentation + Hands-on Labs (100% Free)
Table of Contents
- TEE - Trusted Execution Environment
- Root of Trust & Chain of Trust
- cgroups - Control Groups
- Disk Partitioning, Rescue & Mount Security
- TPM Usage & Coverage
- Linux Namespaces
- AppArmor - Mandatory Access Control
- IEC-62443 Industry Context
- Lab Setup & Tools
1. TEE - Trusted Execution Environment
Learning Path Overview
TEEs provide isolated secure execution for sensitive operations. For railway systems, TEEs protect critical control logic and cryptographic keys from compromised operating systems.
Theory & Conceptual Resources
Video Resources:
- Trusted Execution Environment (TEE) on ESP32-C6 (YouTube, 35 min)
Link
Learn practical TEE implementation on a real embedded platform with hardware isolation mechanisms
-
A Technical Overview of Intel SGX, Arm TrustZone, and AMD SEV (YouTube, 25 min)
Link
Comparative analysis of different TEE technologies - essential for understanding architectural differences -
Proof is in the Pudding: Trusted Execution Environments (YouTube, 40 min)
Link
Technical whiteboard discussion covering root of trust, TEE security models, and attack vectors
Documentation:
- TEE 101 White Paper by Secure Technology Alliance
Link
Foundational 30-page primer on TEE concepts, architecture, and real-world implementations
-
Introduction to Trusted Execution Environment and ARM's TrustZone
Link
Beginner-friendly technical blog explaining TrustZone concepts with practical context -
Guide to ARM TrustZone and OP-TEE: Secure World Design
Link
Covers OP-TEE architecture, trusted app development, and verified boot implementation
Hands-On Lab Resources
OP-TEE (Open Portable Trusted Execution Environment)
- Official OP-TEE Documentation & Build System
Link
Complete reference for building and deploying OP-TEE on ARM platforms
-
OP-TEE Build & Development Guide
Link
Step-by-step instructions for compiling OP-TEE for various ARM devices (Raspberry Pi, QEMU, etc.) -
OP-TEE Sample Applications (optee_examples)
Link
GitHub repository with hands-on examples: AES encryption, secure storage, hello_world, HOTP authentication -
OP-TEE Examples Documentation
Link
Detailed guide for building and running sample trusted applications
ARM TrustZone for Cortex-M (Microcontroller Version)
- Arm TrustZone Getting Started on SAM L11
Link
Microchip tutorial for Cortex-M TrustZone implementation with hands-on project
-
Learn Embedded Security with ARM TrustZone in 50 Minutes
Link
Hands-on video covering ARMv8-M TrustZone, SAU/IDAU, Keil MDK demo with NXP LPC55S69 -
Develop Secure Cortex-M Applications with TrustZone (ARM Webinar)
Link
ARM's official guide for Cortex-M TrustZone development
Porting & Real Devices
- Porting and Running OP-TEE on ARMv8 Devices
Link
30-minute hands-on video showing how to port OP-TEE to custom ARMv8 hardware
Lab Exercises: 1. Build and run OP-TEE hello_world example on QEMU 2. Create a simple trusted application for cryptographic operations 3. Implement secure storage within OP-TEE 4. Explore TEE-REE communication via SMC calls
2. Root of Trust & Chain of Trust
Learning Path Overview
Root of Trust (RoT) and Chain of Trust establish the cryptographic foundation for secure boot. In railway systems, this prevents bootkit attacks and ensures only authorized firmware executes.
Theory & Conceptual Resources
Official Documents:
- UEFI Secure Boot White Paper: Establishing the Root of Trust
Link
Technical deep-dive: hardware RoT, verified boot vs. measured boot, Secure Boot chain
-
UEFI Forum: Chain of Trust Introduction
Link
Explains SEC phase, PEI, DXE phases in UEFI boot, and cryptographic binding -
NSA Guidance: Managing UEFI Secure Boot
Link
Government cybersecurity guidance on Secure Boot implementation and threats
Blog & Articles:
- The IoT Chain of Trust: The Boot Process
Link
IoT-focused explanation of verified boot and measured boot concepts
-
Demystifying Server Root of Trust
Link
Intel Boot Guard, AMD PSP, and secure RoT technologies explained -
Achieving Root of Trust in Automotive MCUs
Link
Real-world automotive implementation of RoT (relevant for railway systems)
Hands-On Lab Resources
Boot with TPM Tutorial:
- Boot with TPM: Secure vs Verified vs Measured
Link
Explains SRTM vs CRTM, verified vs measured boot with TPM integration
Measured Boot Implementation:
- U-Boot Measured Boot Documentation
Link
Practical guide to implementing measured boot in bootloader
UEFI Secure Boot Configuration:
- UEFI Secure Boot Customization Guide (NSA)
Link
Detailed customization procedures for Secure Boot policies
- Arch Linux UEFI Secure Boot Wiki
Link
Practical Linux-based Secure Boot setup and key management
Lab Exercises: 1. Understand UEFI Secure Boot key hierarchy (PK, KEK, DB, DBX) 2. Sign kernel/bootloader binaries and load them into Secure Boot DB 3. Measure firmware components and verify TPM PCR values 4. Test boot failure scenarios (tampered binaries)
3. cgroups - Control Groups
Learning Path Overview
cgroups enable resource limits and isolation for processes. For railway systems, cgroups prevent single applications from consuming all resources, ensuring real-time guarantees for critical control loops.
Theory & Conceptual Resources
Technical Documentation:
- cgroups: Definition, Works, Benefits, and Container Use Cases
Link
Comprehensive guide covering cgroup v1, cgroup v2, CPU/memory/IO limits, Kubernetes integration
-
Introduction to Container Resource Management
Link
Modern cgroup architecture and monitoring strategies -
Linux cgroups on KodeKloud
Link
Focused on container security and process isolation
Hands-On Lab Resources
Practical cgroups Management:
- Controlling Process Resources with Linux cgroups
Link
Interactive tutorial with cgroupfs, libcgroup tools, and systemd integration
-
Docker cgroups Lab
Link
Deep dive into how Docker uses cgroups for container resource management -
How to Use Namespaces and cgroups to Control Docker
Link
Practical examples: CPU limits, memory caps, device restrictions -
What Are Namespaces and cgroups?
Link
NGINX blog explaining resource prioritization and limits
Lab Exercises: 1. Create CPU-limited process groups using cgroupfs directly 2. Monitor memory usage with cgroup memory.stat 3. Implement I/O throttling for block devices 4. Use systemd service units for persistent cgroup management 5. Test CPU allocation fairness across competing processes
4. Disk Partitioning, Rescue & Mount Security
Learning Path Overview
Secure disk partitioning prevents unauthorized data access. Rescue mode isolation and mount permissions protect against privilege escalation. Critical for railway systems' persistent state management.
Theory & Conceptual Resources
Mount Namespaces & Security:
- Mount Namespaces (man7.org Linux Manual)
Link
Exhaustive reference on mount isolation, propagation types, security implications
-
Mount Namespaces and Shared Subtrees (LWN Article)
Link
Advanced concepts: MS_SHARED, MS_SLAVE, MS_PRIVATE propagation -
Linux Security Modules Overview
Link
LSM framework enabling AppArmor, SELinux mount-related policies
Hands-On Lab Resources
Rescue Boot Systems:
- Weekend Project: Rescue Failing Drives with SystemRescue
Link
Hands-on guide to creating rescue boot media and partition recovery
-
SystemRescue - System Rescue Homepage
Link
Official SystemRescue documentation and live ISO -
IONOS Rescue System Documentation
Link
Practical rescue mode operations: fsck, chroot, partition repair -
Mounting Filesystems in Rescue Mode (Selectel Docs)
Link
Step-by-step partition mounting and recovery procedures -
Rackspace: Mount a Partition and chroot in Rescue Mode
Link
Practical chroot workflows for system recovery
Lab Exercises: 1. Create partitioned disk with separate /boot, /root, /var, /home 2. Boot SystemRescue and perform filesystem checks (fsck) 3. Mount filesystems with different security options (ro, noexec, nodev) 4. Create and test bind mounts with propagation flags 5. Recover data from read-only mounted filesystem
5. TPM Usage & Coverage
Learning Path Overview
TPM (Trusted Platform Module) provides hardware-based key storage, measured boot, and integrity verification. Essential for railway systems requiring remote attestation and secure key management.
Theory & Conceptual Resources
Official Specs & Tutorials:
- Introduction to TPMs (OpenSecurityTraining2)
Link
Free MOOC video covering TPM capabilities, use cases, limitations
-
What is a TPM? Protecting Your System
Link
Visual explanation of TPM installation and BitLocker usage -
What is a Trusted Platform Module? (Huntress Cybersecurity Guide)
Link
Key functions: key generation, measured boot, integrity verification -
TPM Usability and Security Study (USENIX SOUPS 2022)
Link
Academic research on tpm2-tools usability and security pitfalls -
Trusted Platform Module Part 1 (LinkedIn Learning - IoT Security)
Link
Compares TEE vs TPM, architecture, and measured boot
Hands-On Lab Resources
TPM 2.0 Software & Tools:
- GitHub: Learn-TPM Educational Repository
Link
Comprehensive guides, code samples, use cases for TPM 2.0
-
tpm2-tss (TPM 2.0 Software Stack)
Link
Official TSS implementation with FAPI, SAPI, ESAPI layers -
tpm2-tss Installation & Build Guide
Link
Step-by-step build instructions for all platforms -
tpm2-tss ReadTheDocs
Link
Official documentation for TSS libraries and simulator setup -
tpm2-tools (CLI Tool Suite)
Link
Command-line interface for TPM operations (key generation, signing, etc.) -
tpm2-tools Documentation
Link
Man pages and build instructions for tpm2-tools
Software TPM Simulator:
- IBM's Software TPM 2.0 Simulator
Link
Free TPM 2.0 simulator for development (no hardware required)
Python Bindings:
- tpm2-pytss: Python TPM Bindings
Link
High-level Python API for TPM operations
Hardware Lab (Optional):
- Designing an Open-Source Hardware TPM 2.0 Add-on for Raspberry Pi
Link
KiCad PCB design, Infineon SLB 9672 chip, hands-on assembly & testing
Lab Exercises: 1. Install and configure tpm2-tss and tpm2-tools 2. Generate TPM keys and explore key hierarchies 3. Create and seal data to PCR values 4. Implement measured boot logging with TPM PCRs 5. Test remote attestation workflows 6. Use TPM for encryption key storage
6. Linux Namespaces
Learning Path Overview
Namespaces provide process isolation at the OS level. For railway systems, they enable containerized control logic with strong isolation boundaries (PID, NET, UTS, IPC, USER, MNT, CGROUP).
Theory & Conceptual Resources
Technical Articles:
- Understanding Linux Namespaces: A Guide to Process Isolation
Link
Beginner-friendly guide covering all namespace types with examples
-
The 7 Most Used Linux Namespaces (Red Hat Blog)
Link
Official Red Hat coverage of namespace isolation mechanisms -
Digging into Linux Namespaces - Part 1 (Quarkslab)
Link
Deep technical analysis with network namespace examples -
Building a Linux Container by Hand Using Namespaces (Red Hat)
Link
Step-by-step tutorial creating container primitives from scratch
Hands-On Lab Resources
Practical Namespace Experiments:
- Jailing Apps Using Linux Namespaces (UWSGI Docs)
Link
Hands-on using setns(), /proc/self/ns, and namespace attachment
-
Docker Namespaces and cgroups Lab
Link
Interactive lab environment for namespace and cgroup experiments -
Docker Internals: Namespaces & cgroups
Link
Visual explanation of how Docker uses namespaces for isolation -
Introduction to Docker (Lightweight Virtualization)
Link
Lab exercises: PID namespace, network namespace creation
Lab Exercises:
1. Create PID namespaces using unshare -p and fork()
2. Create network namespaces and connect with veth pairs
3. Use USER namespaces for rootless container execution
4. Create MOUNT namespaces and test bind mount propagation
5. Explore /proc/[PID]/ns files and namespace relationships
6. Implement multi-level namespace hierarchies
7. AppArmor - Mandatory Access Control
Learning Path Overview
AppArmor enforces fine-grained access control policies per application. For railway systems, AppArmor restricts services to minimal required capabilities, implementing defense-in-depth.
Theory & Conceptual Resources
Official & Authoritative Sources:
- AppArmor Official Homepage
Link
Official project documentation and overview
-
Implementing Mandatory Access Control (Tecmint)
Link
Comparison of AppArmor vs SELinux with practical focus -
AppArmor (Arch Wiki)
Link
Community documentation with installation and configuration -
Linux Kernel AppArmor Documentation
Link
Kernel configuration and LSM integration details -
The Linux Security Modules Framework (Star Lab Software)
Link
Comprehensive LSM overview including AppArmor's role -
Linux Security Modules & Access Control (AccuKnox)
Link
LSM hooks architecture and AppArmor enforcement mechanisms -
Linux Audit: AppArmor Security Framework
Link
History, features, and profile-based security model
Hands-On Lab Resources
Docker AppArmor Lab:
- Docker Labs: AppArmor Security
Link
25-minute advanced lab: default Docker profile, custom profiles, defense-in-depth
- AppArmor in Kubernetes
Link
Beta AppArmor support in Kubernetes with enforcement details
Profile Development Tools:
- Creating AppArmor Profiles: 9 Easy Steps
Link
Step-by-step profile creation: aa-genprof, aa-complain, aa-logprof
-
Beginning AppArmor Profile Development (Ubuntu Tutorials)
Link
Profile development with aa-genprof and learning mode -
AppArmor Profile Development (KodeKloud)
Link
Enforcing mode vs complain mode, practical examples
Lab Exercises: 1. Install apparmor-utils and enable AppArmor 2. Generate profile for a sample application using aa-genprof 3. Run application in complain mode and review audit logs 4. Write custom AppArmor profile restricting file/capability access 5. Switch profile to enforce mode and test blocking behavior 6. Create defense-in-depth profile for railway control service
8. IEC-62443 Industry Context
Learning Path Overview
IEC-62443 is the industrial cybersecurity standard. Understanding its framework, security levels, and system integration requirements is critical for role preparation.
Free Resources & Training Materials
Free IEC-62443 Guide:
- Free OT Cybersecurity Book: IEC-62443 Introduction
Link
100-page free download covering all parts of IEC-62443 with 2024 numbering updates
Official ISA Training & Certification:
- ISA/IEC 62443 Cybersecurity Certificate Program
Link
Five-day course covering complete IACS lifecycle
-
ISA Training & Education Overview
Link
Microlearning modules (5-10 min), free YouTube content, IC46M overview course -
UL's ISA/IEC 62443 Training
Link
3-day training on Parts 4-1 and 4-2 (product development security)
Railway-Specific Context:
- IEC-62443 Assessment for Metro Rail Infrastructure
Link
Railway-specific application: control room access, OT employee awareness, incident response
Lab Exercises:
- Map IEC-62443 concepts to railway signaling systems
- Identify security levels (SL 1-4) for hypothetical control scenarios
- Design defense-in-depth architecture using learned technologies
- Create risk assessment following IEC-62443 methodology
9. Lab Setup & Tools
Recommended Development Environment
Host System Requirements: - Linux distribution (Ubuntu 20.04 LTS+ or Debian 11+) recommended - 4+ CPU cores, 8GB+ RAM, 50GB+ disk space - Git, Docker (optional but recommended)
Essential Free Tools Installation
## System packages
sudo apt-get update
sudo apt-get install -y \
build-essential git autoconf automake libtool pkgconfig \
python3 python3-dev python3-pip \
libssl-dev libffi-dev \
qemu-system-arm qemu-user \
gcc-arm-linux-gnueabihf gcc-aarch64-linux-gnu
## TPM 2.0 Tools
git clone [Link](https://github.com/tpm2-software/tpm2-tss.git
cd tpm2-tss && ./bootstrap && ./configure && make && sudo make install
git clone [Link](https://github.com/tpm2-software/tpm2-tools.git
cd tpm2-tools && ./bootstrap && ./configure && make && sudo make install
## AppArmor tools
sudo apt-get install -y apparmor apparmor-utils apparmor-profiles
## cgroup management
sudo apt-get install -y cgroup-tools systemd-container
## Linux utilities for namespaces
sudo apt-get install -y util-linux iproute2 net-tools
## OP-TEE prerequisites (optional for full setup)
git clone [Link](https://github.com/OP-TEE/build.git
## Follow: [Link](https://optee.readthedocs.io/en/latest/building/gits/build.html
Suggested Learning Sequence
Week 1-2: Foundations - Study TEE concepts (videos + white paper) - Hands-on: Build OP-TEE hello_world example - Study Root of Trust and Secure Boot
Week 3-4: Boot Security - Implement measured boot with TPM - Lab: tpm2-tools key management and PCR sealing - Study UEFI Secure Boot customization
Week 5-6: Resource & Process Isolation - Deep-dive cgroups: CPU, memory, I/O limits - Study namespaces: PID, NET, MNT, USER - Lab exercises: Create isolated processes
Week 7-8: Access Control - Study AppArmor architecture and profiles - Create custom AppArmor profiles - Combine cgroups + AppArmor for defense-in-depth
Week 9-10: Integration & Railway Context - Study IEC-62443 framework - Map learned technologies to railway requirements - Design secure railway control architecture
Week 11-12: Practical Projects - Build complete OP-TEE trusted application - Implement secure boot chain on hardware (if available) - Create AppArmor profiles for railway-relevant services
Free Cloud Lab Environments (Optional)
- Linux Academy / A Cloud Guru (free tier available)
- KKE: EKS, Docker, and Container Security Labs
[Link](https://eksgoat.kubernetesvillage.com/ - NVIDIA cuDNN Docker images for ARM testing
Key GitHub Repositories to Follow
- [Link](https://github.com/OP-TEE/ - Trusted Execution Environment
- [Link](https://github.com/tpm2-software/ - TPM 2.0 implementations
- [Link](https://github.com/tpm2dev/ - TPM development tutorials
- [Link](https://github.com/tpm2-software/tpm2-tools - CLI tools
- [Link](https://github.com/docker/labs - Container security labs
- [Link](https://github.com/linaro-swg/ - Linaro Secure Group projects
Learning Path Recommendations by Background
If You Have Embedded Systems Experience:
- Start with TEE/OP-TEE (Week 1-3)
- Jump directly to TPM and measured boot (Week 4-5)
- Study AppArmor in parallel (Week 6-7)
- Focus on railway integration (Week 8+)
If You Have Linux/Kernel Experience:
- Begin with namespaces and cgroups (Week 1-2)
- Study AppArmor and LSM framework (Week 3-4)
- Add TEE concepts (Week 5-6)
- Integrate TPM and boot security (Week 7-8)
If You Have Security Background but Limited Embedded:
- Study TEE and RoT concepts first (Week 1-3)
- Deep-dive AppArmor and mandatory access control (Week 4-5)
- Learn Linux-specific: namespaces, cgroups, TPM (Week 6-8)
- Focus on railway threat modeling (Week 9+)
Assessment Checkpoints
After Weeks 4-6, you should be able to: - Explain TEE/TrustZone architecture with secure/normal worlds - Describe verified boot vs measured boot with PCR mechanics - Create AppArmor profiles from audit logs - Implement cgroup resource limits for processes
After Weeks 8-10, you should be able to: - Deploy OP-TEE trusted applications - Configure TPM 2.0 key hierarchies and sealing - Design namespace-based isolation strategies - Map IEC-62443 security levels to implementation
After Week 12, you should: - Design a secure railway control architecture using learned technologies - Present threat models and mitigations for each component - Perform hands-on vulnerability assessment using acquired skills - Discuss real-world trade-offs (security vs. performance vs. cost)
Final Notes
Free Resources Used in This Roadmap: - ✅ All videos from YouTube (official channels) - ✅ Official GitHub repositories and documentation - ✅ Open-source software (OP-TEE, TPM 2.0 tools, Linux kernel) - ✅ White papers and technical guides (UEFI, NSA, academic) - ✅ Community-maintained wikis and blogs - ✅ Free cloud labs and simulators
Total Estimated Learning Time: 12 weeks at ~20 hours/week = 240 hours)
Hands-on Lab Time: ~80-100 hours)
Theory & Video Study: ~100-120 hours)
Integration & Projects: ~40-60 hours
Next Steps After This Roadmap: 1. Pursue ISA/IEC-62443 certification 2. Contribute to open-source security projects (OP-TEE, tpm2-software) 3. Research latest CVEs in embedded systems and their mitigations 4. Engage with railway cybersecurity working groups
But Wait... There is More...
I wanted to know if there was videos covering all the topics explained, So I punched that in as a follow up, and here is the result:
Embedded Cybersecurity Learning Roadmap: IEC-62443 Railway Industry
Target Role: Embedded Cybersecurity Engineer (Railway Industry)
Standard: IEC-62443 (Industrial Automation & Control Systems Cybersecurity)
Preparation Date: February 2026)
Learning Format: Video + Documentation + Hands-on Labs (100% Free)
Table of Contents
- TEE - Trusted Execution Environment
- Root of Trust & Chain of Trust
- cgroups - Control Groups
- Disk Partitioning, Rescue & Mount Security
- TPM Usage & Coverage
- Linux Namespaces
- AppArmor - Mandatory Access Control
- IEC-62443 Industry Context
- Lab Setup & Tools
1. TEE - Trusted Execution Environment
Learning Path Overview
TEEs provide isolated secure execution for sensitive operations. For railway systems, TEEs protect critical control logic and cryptographic keys from compromised operating systems.
Video Resources
YouTube Tutorials:
- Trusted Execution Environment (TEE) on ESP32-C6 (YouTube, 35 min)
Link
Learn practical TEE implementation on a real embedded platform with hardware isolation mechanisms
-
A Technical Overview of Intel SGX, Arm TrustZone, and AMD SEV (YouTube, 25 min)
Link
Comparative analysis of different TEE technologies - essential for understanding architectural differences -
Proof is in the Pudding: Trusted Execution Environments (YouTube, 40 min)
Link
Technical whiteboard discussion covering root of trust, TEE security models, and attack vectors -
Learn Embedded Security with ARM TrustZone in 50 Minutes (YouTube, 50 min)
Link
Hands-on video covering ARMv8-M TrustZone, SAU/IDAU, Keil MDK demo with NXP LPC55S69 -
Develop Secure Cortex-M Applications with TrustZone (YouTube, 30 min)
Link
ARM's official guide for Cortex-M TrustZone development -
Porting and Running OP-TEE on ARMv8 Devices (YouTube, 30 min)
Link
Hands-on video showing how to port OP-TEE to custom ARMv8 hardware
Documentation Resources
TEE 101 White Paper by Secure Technology Alliance
Link
Foundational 30-page primer on TEE concepts, architecture, and real-world implementations
Introduction to Trusted Execution Environment and ARM's TrustZone
Link
Beginner-friendly technical blog explaining TrustZone concepts with practical context
Guide to ARM TrustZone and OP-TEE: Secure World Design
Link
Covers OP-TEE architecture, trusted app development, and verified boot implementation
Hands-On Lab Resources
OP-TEE (Open Portable Trusted Execution Environment)
- Official OP-TEE Documentation & Build System
Link
Complete reference for building and deploying OP-TEE on ARM platforms
-
OP-TEE Build & Development Guide
Link
Step-by-step instructions for compiling OP-TEE for various ARM devices (Raspberry Pi, QEMU, etc.) -
OP-TEE Sample Applications (optee_examples)
Link
GitHub repository with hands-on examples: AES encryption, secure storage, hello_world, HOTP authentication -
OP-TEE Examples Documentation
Link
Detailed guide for building and running sample trusted applications
ARM TrustZone for Cortex-M (Microcontroller Version)
- Arm TrustZone Getting Started on SAM L11
Link
Microchip tutorial for Cortex-M TrustZone implementation with hands-on project
Lab Exercises: 1. Build and run OP-TEE hello_world example on QEMU 2. Create a simple trusted application for cryptographic operations 3. Implement secure storage within OP-TEE 4. Explore TEE-REE communication via SMC calls
2. Root of Trust & Chain of Trust
Learning Path Overview
Root of Trust (RoT) and Chain of Trust establish the cryptographic foundation for secure boot. In railway systems, this prevents bootkit attacks and ensures only authorized firmware executes.
Video Resources
YouTube Tutorials:
- Implementing UEFI-based Secure Boot + OTA Update for ARM Devices (YouTube, 30 min)
Link
Deep technical talk: UAV/embedded systems secure boot, firmware integrity verification, U-Boot signing
-
UEFI Secure Boot in U-Boot - Grant Likely, Arm (YouTube, 35 min)
Link
Official ARM presentation: secure variables, chain of trust, UEFI verification mechanisms -
Enabling UEFI Secure Boot on x86 Platform with Yocto (YouTube, 35 min)
Link
Practical Yocto integration, meta-secure-core layer, UEFI Secure Boot implementation
Documentation Resources
Official Documents:
- UEFI Secure Boot White Paper: Establishing the Root of Trust
Link
Technical deep-dive: hardware RoT, verified boot vs. measured boot, Secure Boot chain
-
UEFI Forum: Chain of Trust Introduction
Link
Explains SEC phase, PEI, DXE phases in UEFI boot, and cryptographic binding -
NSA Guidance: Managing UEFI Secure Boot
Link
Government cybersecurity guidance on Secure Boot implementation and threats
Blog & Articles:
- The IoT Chain of Trust: The Boot Process
Link
IoT-focused explanation of verified boot and measured boot concepts
-
Demystifying Server Root of Trust
Link
Intel Boot Guard, AMD PSP, and secure RoT technologies explained -
Achieving Root of Trust in Automotive MCUs
Link
Real-world automotive implementation of RoT (relevant for railway systems)
Hands-On Lab Resources
Boot with TPM Tutorial:
- Boot with TPM: Secure vs Verified vs Measured
Link
Explains SRTM vs CRTM, verified vs measured boot with TPM integration
Measured Boot Implementation:
- U-Boot Measured Boot Documentation
Link
Practical guide to implementing measured boot in bootloader
UEFI Secure Boot Configuration:
- UEFI Secure Boot Customization Guide (NSA)
Link
Detailed customization procedures for Secure Boot policies
- Arch Linux UEFI Secure Boot Wiki
Link
Practical Linux-based Secure Boot setup and key management
Lab Exercises: 1. Understand UEFI Secure Boot key hierarchy (PK, KEK, DB, DBX) 2. Sign kernel/bootloader binaries and load them into Secure Boot DB 3. Measure firmware components and verify TPM PCR values 4. Test boot failure scenarios (tampered binaries)
3. cgroups - Control Groups
Learning Path Overview
cgroups enable resource limits and isolation for processes. For railway systems, cgroups prevent single applications from consuming all resources, ensuring real-time guarantees for critical control loops.
Video Resources
YouTube Tutorials:
- How to Understand Linux Control Groups (cgroups) (YouTube, 20 min)
Link
Sysadmincasts episode: practical examples of CPU, memory, I/O throttling, cgroup configuration
-
Demystifying Linux cgroups (YouTube, 17 min)
Link
BeginLinux Guru: comprehensive cgroups overview, moving away from confusing technical details -
Modern Linux Servers with cgroups (YouTube, 35 min)
Link
Brandon Philips presentation: cgroups interface, resource management, container integration -
Cgroups, Namespaces, and Beyond: What Are Containers Made From? (YouTube, 40 min)
Link
CoreOS presentation: deep dive into container building blocks, cgroups + namespaces
Documentation Resources
Technical Documentation:
- cgroups: Definition, Works, Benefits, and Container Use Cases
Link
Comprehensive guide covering cgroup v1, cgroup v2, CPU/memory/IO limits, Kubernetes integration
-
Introduction to Container Resource Management
Link
Modern cgroup architecture and monitoring strategies -
Linux cgroups on KodeKloud
Link
Focused on container security and process isolation -
Resource Control in Embedded Linux Systems with cgroups (SYSGO Blog)
Link
Embedded systems focus: real-time applications, persistent cgroups, railway-relevant content
Hands-On Lab Resources
Practical cgroups Management:
- Controlling Process Resources with Linux cgroups
Link
Interactive tutorial with cgroupfs, libcgroup tools, and systemd integration
-
Docker cgroups Lab
Link
Deep dive into how Docker uses cgroups for container resource management -
How to Use Namespaces and cgroups to Control Docker
Link
Practical examples: CPU limits, memory caps, device restrictions -
What Are Namespaces and cgroups?
Link
NGINX blog explaining resource prioritization and limits
Lab Exercises: 1. Create CPU-limited process groups using cgroupfs directly 2. Monitor memory usage with cgroup memory.stat 3. Implement I/O throttling for block devices 4. Use systemd service units for persistent cgroup management 5. Test CPU allocation fairness across competing processes
4. Disk Partitioning, Rescue & Mount Security
Learning Path Overview
Secure disk partitioning prevents unauthorized data access. Rescue mode isolation and mount permissions protect against privilege escalation. Critical for railway systems' persistent state management.
Video Resources
YouTube Tutorials:
- Partitioning and Mounting Disks in Linux with fdisk (YouTube, 25 min)
Link
Eugene Abaidoo: comprehensive fdisk tutorial, partition creation, filesystem setup, permissions
-
Manually Mounting Partitions in Ubuntu Server (YouTube, 5 min)
Link
Quick reference: mount/umount commands, discovering partitions, fstab configuration -
Linux Partitions and Mount Points: Preparing a DIY NAS (YouTube, 25 min)
Link
Practical NAS setup: partition schemes, mounting, data security, LUKS encryption -
Physical Image and Partition Mounting in Tsurugi Linux (YouTube, 9 min)
Link
Forensics perspective: mounting disk images, accessing filesystem, partition recovery -
The Mount Namespace - Container Security Fundamentals (YouTube, 8 min)
Link
Datadog Security Labs: mount namespace isolation, filesystem security in containers -
How to Mount and Unmount Filesystem or Partition in Linux (YouTube, 10 min)
Link
Comprehensive guide covering mount points, umount, persistent mounts
Documentation Resources
Mount Namespaces & Security:
- Mount Namespaces (man7.org Linux Manual)
Link
Exhaustive reference on mount isolation, propagation types, security implications
-
Mount Namespaces and Shared Subtrees (LWN Article)
Link
Advanced concepts: MS_SHARED, MS_SLAVE, MS_PRIVATE propagation -
Linux Security Modules Overview
Link
LSM framework enabling AppArmor, SELinux mount-related policies
Hands-On Lab Resources
Rescue Boot Systems:
- Weekend Project: Rescue Failing Drives with SystemRescue
Link
Hands-on guide to creating rescue boot media and partition recovery
-
SystemRescue - System Rescue Homepage
Link
Official SystemRescue documentation and live ISO -
IONOS Rescue System Documentation
Link
Practical rescue mode operations: fsck, chroot, partition repair -
Mounting Filesystems in Rescue Mode (Selectel Docs)
Link
Step-by-step partition mounting and recovery procedures -
Rackspace: Mount a Partition and chroot in Rescue Mode
Link
Practical chroot workflows for system recovery
Lab Exercises: 1. Create partitioned disk with separate /boot, /root, /var, /home 2. Boot SystemRescue and perform filesystem checks (fsck) 3. Mount filesystems with different security options (ro, noexec, nodev) 4. Create and test bind mounts with propagation flags 5. Recover data from read-only mounted filesystem
5. TPM Usage & Coverage
Learning Path Overview
TPM (Trusted Platform Module) provides hardware-based key storage, measured boot, and integrity verification. Essential for railway systems requiring remote attestation and secure key management.
Video Resources
YouTube Tutorials:
- Introduction to TPMs (OpenSecurityTraining2) (YouTube, 30 min)
Link
Free MOOC video covering TPM capabilities, use cases, limitations
-
What is a TPM? Protecting Your System (YouTube, 15 min)
Link
Visual explanation of TPM installation and BitLocker usage -
Designing an Open-Source Hardware TPM 2.0 Add-on for Raspberry Pi (YouTube, 40 min)
Link
KiCad PCB design, Infineon SLB 9672 chip, hands-on assembly & testing
Documentation Resources
Official Specs & Tutorials:
- What is a Trusted Platform Module? (Huntress Cybersecurity Guide)
Link
Key functions: key generation, measured boot, integrity verification
-
TPM Usability and Security Study (USENIX SOUPS 2022)
Link
Academic research on tpm2-tools usability and security pitfalls -
Trusted Platform Module Part 1 (LinkedIn Learning - IoT Security)
Link
Compares TEE vs TPM, architecture, and measured boot
Hands-On Lab Resources
TPM 2.0 Software & Tools:
- GitHub: Learn-TPM Educational Repository
Link
Comprehensive guides, code samples, use cases for TPM 2.0
-
tpm2-tss (TPM 2.0 Software Stack)
Link
Official TSS implementation with FAPI, SAPI, ESAPI layers -
tpm2-tss Installation & Build Guide
Link
Step-by-step build instructions for all platforms -
tpm2-tss ReadTheDocs
Link
Official documentation for TSS libraries and simulator setup -
tpm2-tools (CLI Tool Suite)
Link
Command-line interface for TPM operations (key generation, signing, etc.) -
tpm2-tools Documentation
Link
Man pages and build instructions for tpm2-tools
Software TPM Simulator:
- IBM's Software TPM 2.0 Simulator
Link
Free TPM 2.0 simulator for development (no hardware required)
Python Bindings:
- tpm2-pytss: Python TPM Bindings
Link
High-level Python API for TPM operations
Lab Exercises: 1. Install and configure tpm2-tss and tpm2-tools 2. Generate TPM keys and explore key hierarchies 3. Create and seal data to PCR values 4. Implement measured boot logging with TPM PCRs 5. Test remote attestation workflows 6. Use TPM for encryption key storage
6. Linux Namespaces
Learning Path Overview
Namespaces provide process isolation at the OS level. For railway systems, they enable containerized control logic with strong isolation boundaries (PID, NET, UTS, IPC, USER, MNT, CGROUP).
Video Resources
YouTube Tutorials:
- How Do Linux Namespaces Provide Process Isolation? (YouTube, 4 min)
Link
Server Logic Simplified: concise overview of all namespace types and isolation mechanisms
-
How Containers Use PID Namespaces to Provide Process Isolation (YouTube, 11 min)
Link
Red Hat TAM Brian Smith: practical PID namespace demonstration on RHEL 8.2 -
Containers Unplugged: Linux Namespaces - Michael Kerrisk (YouTube, 45 min)
Link
Expert deep-dive: namespace APIs, clone(), setns(), unshare() syscalls, practical examples -
What is a Namespace in Linux, and How Does It Work (YouTube, 10 min)
Link
Overview of PID, mount, IPC, UTS namespaces with container examples -
The Mount Namespace - Container Security Fundamentals (YouTube, 8 min)
Link
Datadog Security Labs: mount namespace isolation for filesystem security
Documentation Resources
Technical Articles:
- Understanding Linux Namespaces: A Guide to Process Isolation
Link
Beginner-friendly guide covering all namespace types with examples
-
The 7 Most Used Linux Namespaces (Red Hat Blog)
Link
Official Red Hat coverage of namespace isolation mechanisms -
Digging into Linux Namespaces - Part 1 (Quarkslab)
Link
Deep technical analysis with network namespace examples -
Building a Linux Container by Hand Using Namespaces (Red Hat)
Link
Step-by-step tutorial creating container primitives from scratch
Hands-On Lab Resources
Practical Namespace Experiments:
- Jailing Apps Using Linux Namespaces (UWSGI Docs)
Link
Hands-on using setns(), /proc/self/ns, and namespace attachment
-
Docker Namespaces and cgroups Lab
Link
Interactive lab environment for namespace and cgroup experiments -
Docker Internals: Namespaces & cgroups
Link
Visual explanation of how Docker uses namespaces for isolation -
Introduction to Docker (Lightweight Virtualization)
Link
Lab exercises: PID namespace, network namespace creation
Lab Exercises:
1. Create PID namespaces using unshare -p and fork()
2. Create network namespaces and connect with veth pairs
3. Use USER namespaces for rootless container execution
4. Create MOUNT namespaces and test bind mount propagation
5. Explore /proc/[PID]/ns files and namespace relationships
6. Implement multi-level namespace hierarchies
7. AppArmor - Mandatory Access Control
Learning Path Overview
AppArmor enforces fine-grained access control policies per application. For railway systems, AppArmor restricts services to minimal required capabilities, implementing defense-in-depth.
Video Resources
YouTube Tutorials:
- Using AppArmor Profiles on Ubuntu 20.04 (YouTube, 16 min)
Link
TheUrbanPenguin: practical AppArmor profile creation, complain mode, enforcement
-
Mandatory Access Control (MAC): SELinux & AppArmor (YouTube, 20 min)
Link
Comparison of SELinux vs AppArmor, path-based access control, profile modes -
The Ultimate Guide to Securing Kubernetes with AppArmor (YouTube, 15 min)
Link
AppArmor profile creation, Kubernetes integration, deny/allow rules -
Unprivileged Access Control in AppArmor - John Johansen & Georgia Garcia, Canonical (YouTube, 40 min)
Link
Canonical maintainers: advanced AppArmor features, pledge, unveil, stacking
Documentation Resources
Official & Authoritative Sources:
- AppArmor Official Homepage
Link
Official project documentation and overview
-
Implementing Mandatory Access Control (Tecmint)
Link
Comparison of AppArmor vs SELinux with practical focus -
AppArmor (Arch Wiki)
Link
Community documentation with installation and configuration -
Linux Kernel AppArmor Documentation
Link
Kernel configuration and LSM integration details -
The Linux Security Modules Framework (Star Lab Software)
Link
Comprehensive LSM overview including AppArmor's role -
Linux Security Modules & Access Control (AccuKnox)
Link
LSM hooks architecture and AppArmor enforcement mechanisms -
Linux Audit: AppArmor Security Framework
Link
History, features, and profile-based security model -
How to Set Up AppArmor Profiles on Ubuntu (OneUptime)
Link
Modern AppArmor configuration guide with practical examples
Hands-On Lab Resources
Docker AppArmor Lab:
- Docker Labs: AppArmor Security
Link
25-minute advanced lab: default Docker profile, custom profiles, defense-in-depth
- AppArmor in Kubernetes
Link
Beta AppArmor support in Kubernetes with enforcement details
Profile Development Tools:
- Creating AppArmor Profiles: 9 Easy Steps
Link
Step-by-step profile creation: aa-genprof, aa-complain, aa-logprof
-
Beginning AppArmor Profile Development (Ubuntu Tutorials)
Link
Profile development with aa-genprof and learning mode -
AppArmor Profile Development (KodeKloud)
Link
Enforcing mode vs complain mode, practical examples
Lab Exercises: 1. Install apparmor-utils and enable AppArmor 2. Generate profile for a sample application using aa-genprof 3. Run application in complain mode and review audit logs 4. Write custom AppArmor profile restricting file/capability access 5. Switch profile to enforce mode and test blocking behavior 6. Create defense-in-depth profile for railway control service
8. IEC-62443 Industry Context
Learning Path Overview
IEC-62443 is the industrial cybersecurity standard. Understanding its framework, security levels, and system integration requirements is critical for role preparation.
Video Resources
YouTube Tutorials:
- Master OT/ICS Cybersecurity Before It's Too Late — Part 1 (YouTube, 27 min)
Link
Mike Holcomb: comprehensive ICS/OT cybersecurity overview, 62443 standard framework, certification path
-
Part 2: Building a ROCK SOLID 62443 Cybersecurity Management System (CSMS) (YouTube, 105 min)
Link
Deep-dive into cybersecurity management system design, IACS lifecycle, security levels -
IEC/ISA 62443 Cybersecurity Bootcamp Day 1 Part 1 (YouTube, 35 min)
Link
62443 overview, key terminology, concepts, risk assessment foundations -
THE BEST Way to Prepare for ISA/IEC 62443 Certification (YouTube, 45 min)
Link
Manjunath Hiregange: study strategies, actionable tips, certification preparation roadmap
Documentation Resources
Free IEC-62443 Guide:
- Free OT Cybersecurity Book: IEC-62443 Introduction
Link
100-page free download covering all parts of IEC-62443 with 2024 numbering updates
Official ISA Training & Certification:
- ISA/IEC 62443 Cybersecurity Certificate Program
Link
Five-day course covering complete IACS lifecycle
-
ISA Training & Education Overview
Link
Microlearning modules (5-10 min), free YouTube content, IC46M overview course -
UL's ISA/IEC 62443 Training
Link
3-day training on Parts 4-1 and 4-2 (product development security)
Railway-Specific Context:
- IEC-62443 Assessment for Metro Rail Infrastructure
Link
Railway-specific application: control room access, OT employee awareness, incident response
Lab Exercises:
- Map IEC-62443 concepts to railway signaling systems
- Identify security levels (SL 1-4) for hypothetical control scenarios
- Design defense-in-depth architecture using learned technologies
- Create risk assessment following IEC-62443 methodology
9. Lab Setup & Tools
Recommended Development Environment
Host System Requirements: - Linux distribution (Ubuntu 20.04 LTS+ or Debian 11+) recommended - 4+ CPU cores, 8GB+ RAM, 50GB+ disk space - Git, Docker (optional but recommended)
Essential Free Tools Installation
## System packages
sudo apt-get update
sudo apt-get install -y \
build-essential git autoconf automake libtool pkgconfig \
python3 python3-dev python3-pip \
libssl-dev libffi-dev \
qemu-system-arm qemu-user \
gcc-arm-linux-gnueabihf gcc-aarch64-linux-gnu
## TPM 2.0 Tools
git clone [Link](https://github.com/tpm2-software/tpm2-tss.git
cd tpm2-tss && ./bootstrap && ./configure && make && sudo make install
git clone [Link](https://github.com/tpm2-software/tpm2-tools.git
cd tpm2-tools && ./bootstrap && ./configure && make && sudo make install
## AppArmor tools
sudo apt-get install -y apparmor apparmor-utils apparmor-profiles
## cgroup management
sudo apt-get install -y cgroup-tools systemd-container
## Linux utilities for namespaces
sudo apt-get install -y util-linux iproute2 net-tools
## OP-TEE prerequisites (optional for full setup)
git clone [Link](https://github.com/OP-TEE/build.git
## Follow: [Link](https://optee.readthedocs.io/en/latest/building/gits/build.html
Suggested Learning Sequence
Week 1-2: Foundations - Study TEE concepts (videos + white paper) - Hands-on: Build OP-TEE hello_world example - Study Root of Trust and Secure Boot
Week 3-4: Boot Security - Implement measured boot with TPM - Lab: tpm2-tools key management and PCR sealing - Study UEFI Secure Boot customization
Week 5-6: Resource & Process Isolation - Deep-dive cgroups: CPU, memory, I/O limits - Study namespaces: PID, NET, MNT, USER - Lab exercises: Create isolated processes
Week 7-8: Access Control - Study AppArmor architecture and profiles - Create custom AppArmor profiles - Combine cgroups + AppArmor for defense-in-depth
Week 9-10: Integration & Railway Context - Study IEC-62443 framework - Map learned technologies to railway requirements - Design secure railway control architecture
Week 11-12: Practical Projects - Build complete OP-TEE trusted application - Implement secure boot chain on hardware (if available) - Create AppArmor profiles for railway-relevant services
Key GitHub Repositories to Follow
- [Link](https://github.com/OP-TEE/ - Trusted Execution Environment
- [Link](https://github.com/tpm2-software/ - TPM 2.0 implementations
- [Link](https://github.com/tpm2dev/ - TPM development tutorials
- [Link](https://github.com/tpm2-software/tpm2-tools - CLI tools
- [Link](https://github.com/docker/labs - Container security labs
- [Link](https://github.com/linaro-swg/ - Linaro Secure Group projects
Learning Path Recommendations by Background
If You Have Embedded Systems Experience:
- Start with TEE/OP-TEE (Week 1-3)
- Jump directly to TPM and measured boot (Week 4-5)
- Study AppArmor in parallel (Week 6-7)
- Focus on railway integration (Week 8+)
If You Have Linux/Kernel Experience:
- Begin with namespaces and cgroups (Week 1-2)
- Study AppArmor and LSM framework (Week 3-4)
- Add TEE concepts (Week 5-6)
- Integrate TPM and boot security (Week 7-8)
If You Have Security Background but Limited Embedded:
- Study TEE and RoT concepts first (Week 1-3)
- Deep-dive AppArmor and mandatory access control (Week 4-5)
- Learn Linux-specific: namespaces, cgroups, TPM (Week 6-8)
- Focus on railway threat modeling (Week 9+)
Assessment Checkpoints
After Weeks 4-6, you should be able to: - Explain TEE/TrustZone architecture with secure/normal worlds - Describe verified boot vs measured boot with PCR mechanics - Create AppArmor profiles from audit logs - Implement cgroup resource limits for processes
After Weeks 8-10, you should be able to: - Deploy OP-TEE trusted applications - Configure TPM 2.0 key hierarchies and sealing - Design namespace-based isolation strategies - Map IEC-62443 security levels to implementation
After Week 12, you should: - Design a secure railway control architecture using learned technologies - Present threat models and mitigations for each component - Perform hands-on vulnerability assessment using acquired skills - Discuss real-world trade-offs (security vs. performance vs. cost)
Final Notes
Free Resources Used in This Roadmap: - ✅ 30+ YouTube Videos from official channels (TEE, Root of Trust, cgroups, mount security, TPM, namespaces, AppArmor, IEC-62443) - ✅ 50+ Technical Documentation resources (white papers, guides, blogs, wikis) - ✅ 25+ Hands-on Lab repositories and interactive environments - ✅ 7+ GitHub Projects for practical implementation - ✅ Open-source software (OP-TEE, TPM 2.0 tools, Linux kernel, AppArmor) - ✅ Free cloud labs and simulators
Total Estimated Learning Time: 12 weeks at ~20 hours/week = 240 hours)
Hands-on Lab Time: ~80-100 hours)
Theory & Video Study: ~100-120 hours)
Integration & Projects: ~40-60 hours
Video Content Breakdown: - TEE: 6 videos (3.5 hours) - Root of Trust: 3 videos (1.5 hours) - cgroups: 4 videos (1.5 hours) - Disk/Mount: 6 videos (1.5 hours) - TPM: 3 videos (1.5 hours) - Namespaces: 5 videos (1.5 hours) - AppArmor: 4 videos (1.5 hours) - IEC-62443: 4 videos (3.5 hours) - Total Video Time: 16+ hours of curated content
Next Steps After This Roadmap: 1. Pursue ISA/IEC-62443 certification 2. Contribute to open-source security projects (OP-TEE, tpm2-software) 3. Research latest CVEs in embedded systems and their mitigations 4. Engage with railway cybersecurity working groups
Roadmap Last Updated: February 2, 2026)
Document Version: 2.0 (Complete Video Coverage)
Total Resources: 110+ links including videos, documentation, labs, and GitHub repositories











Capped
Uncapped




























press any key in the keyboard to exit...


It's not bad per say, it has neatly categorized your apps into different sections and you can select each category to find the apps you need... But I prefer a more expanded view, so I change the compact view to expanded view by switching the option on the Actions menu.

From here you can also upgrade your installed programs... just click on "Get Installed" in the Action menu, wait a couple of seconds to get all your install packages, and then click on "Install/Upgrade Selected"
If you want to uninstall the program, same drill... just select the programs you want to remove and click on Uninstall selected... Done and dusted...
If you know about ninite.. this is kinda that on roids. The way this works is by using a package manager. If you're from the Linux space, you will be familiar. This uses one of two available for Windows: 
This panel let's you install various features in Windows. One that I recommend everyone to do is the first tweak, which is "All .Net Framework". Some programs require the .NET framework to run, and this ensures all relevant versions of the .NET framework is installed. You can also check out other features like Windows Subsystem for Linux(WSL), that lets you run Linux inside Windows (Shocker 🤯 I know right). 



At the end of the section, we find the #40 nib unit from ambitious. For the international folks, the #40 nib is kinda... sorta... a #8, but it isn't. It uses the standard 6mm feed often found in #6 nibs, but it is longer and flared out. Kinda like a #6.5 nib. the #40 comes from the length of the nib which is 40mm. The tipping with Ambitious nibs has always been ambiguous, in my experience. this one comes with a fine-medium tipping.







However, it's not all perfect code and flawless logic. Claude 3.7 Sonnet does show some limitations:











