Overview
Learn advanced security capabilities of Trusted Platform Modules (TPM) in this 16-minute lecture that builds upon foundational TPM knowledge. Master secure remote system enrollment techniques, implement Platform Configuration Registers (PCR) for file attestation and system integrity verification, and explore the Enhanced System API according to Trusted Computing Group specifications. Discover TPM 2.0 Policy (extended authorization) fundamentals and learn to seal keys against PCR values - a widely adopted security practice across industries.
Syllabus
Intermediate Trusted Platform Modules (TPMs) usage TC1102 Lecture A -
Taught by
OpenSecurityTraining2