Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Intermediate Trusted Platform Modules Usage - Conclusion

OpenSecurityTraining2 via YouTube

Overview

Learn about the security capabilities of Trusted Platform Modules (TPMs) in this concluding lecture from an intermediate-level course. Explore advanced TPM concepts including secure remote system enrollment, Platform Configuration Registers (PCR) for file attestation and system integrity, and the Enhanced System API specified by the Trusted Computing Group. Master key TPM 2.0 features like extended authorization policies and the process of sealing keys against PCR values - a widely implemented security practice across industries. Building upon foundational TPM knowledge, discover practical applications for implementing robust system security and attestation mechanisms.

Syllabus

Intermediate Trusted Platform Modules (TPMs) usage TC1102 Lecture X - Conclusion

Taught by

OpenSecurityTraining2

Reviews

Start your review of Intermediate Trusted Platform Modules Usage - Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.