Overview
Learn about secure remote system enrollment, Platform Configuration Registers (PCR) for file attestation, and system integrity in this 14-minute lecture from the Intermediate Trusted Platform Modules course. Explore advanced TPM security capabilities, building upon foundational concepts to master the Enhanced System API as specified by the Trusted Computing Group. Discover how to implement TPM 2.0 Policy (extended authorization) and seal keys against PCR values - essential techniques widely used across industries. Access the complete free course materials to deepen your understanding of TPM security implementations and practical applications.
Syllabus
Intermediate Trusted Platform Modules (TPMs) usage TC1102 Lecture G Part 2 -
Taught by
OpenSecurityTraining2