YoVDO

Better Data Security with Commodity TPM Chips

Offered By: Linux Foundation via YouTube

Tags

Trusted Platform Module Courses Cybersecurity Courses Cryptography Courses Hardware Security Courses Data Security Courses Key Management Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the world of Trusted Platform Module (TPM) chips in this 38-minute conference talk by Haris Okanovic from National Instruments. Dive into the fundamentals of TPM technology, its software stack, and its role in enhancing data security. Learn about boot measurements, platform configuration registers, and the dynamic chain of trust. Discover key management techniques, software update processes, and user applications leveraging TPM. Gain insights into the TPM security model, authentication methods, and one-time password (OTP) implementation. Understand potential vulnerabilities and how to address them for robust system security.

Syllabus

Introduction
What is TPM
What is a TPM
TPM Software Stack
TPM Software
Boot Measurements
Platform Configuration Registers
Dynamic Chain of Trust
Pre UEFI
Example Key Management
Software Updates
User Applications
Crypto Token Interface
TPM API
Open Smart Card Project
How to Break Everything
TPM Security Model
Authentication
TPM OTP
Conclusion
Questions


Taught by

Linux Foundation

Tags

Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera