Open Security Training Tackles Trusted Computing and TPM

Date Published: January, 01, 2015

While we’ve most certainly dented an old-growth forest trying to explain the many details of the TPM and Trusted Computing in general, a picture (or a good slide) can be worth a thousand words.

The highly competent Open Security Training group, following in the steps of Khan Academy and other online resources, has taken big steps to demystifying the TPM and Trusted Computing in a new series of training videos.

Developed by Ariel Segall, who participates in the TCG TPM work group, the course “… is an introduction to the fundamental technologies behind Trusted Computing. You will learn what Trusted Platform Modules (TPMs) are and what capabilities they can provide both at an in-depth technical level and in an enterprise context. You will also learn about how other technologies such as the Dynamic Root of Trust for Measurement (DRTM) and virtualization can both take advantage of TPMs and be used to enhance the TPM’s capabilities.

“We will cover major use cases for trusted computing, including machine authentication, data protection, and attestation. This course will also introduce you to the various software resources that exist today to support TPMs, give a high-level overview of related research and development projects, and briefly discuss other trusted computing standards such as Trusted Network Connect which may be relevant to enterprise deployment of TPMs and trusted computing.”

All course materials are provided. Recommended reading includes “The Practical Guide to Trusted Computing” by David Challener, Kent Yoder, Ryan Catherman, David Safford and Leendert Van Doorn.

Check out this course at http://www.opensecuritytraining.info/IntroToTrustedComputing.

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read more