Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Intermediate Trusted Platform Modules Usage - Part 2

OpenSecurityTraining2 via YouTube

Overview

Learn about secure remote system enrollment, Platform Configuration Registers (PCR) for file attestation, and system integrity in this advanced lecture on Trusted Platform Modules (TPM). Explore the Enhanced System API defined by the Trusted Computing Group specification, understand TPM 2.0 Policy (extended authorization), and master the technique of sealing keys against PCR values - a widely implemented security practice across industries. Building upon foundational TPM concepts, discover how to leverage these security capabilities for robust system protection and attestation. Part of a comprehensive TPM training series, this 10-minute lecture delivers practical insights for implementing advanced TPM security features in real-world applications.

Syllabus

Intermediate Trusted Platform Modules (TPMs) usage TC1102 Lecture D Part 2

Taught by

OpenSecurityTraining2

Reviews

Start your review of Intermediate Trusted Platform Modules Usage - Part 2

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.