YoVDO

eSecurity - Trusted Hosts

Offered By: Bill Buchanan OBE via YouTube

Tags

Cybersecurity Courses Entropy Courses BitLocker Courses Disk Encryption Courses

Course Description

Overview

Explore the critical aspects of trusted computing and secure boot processes in this 31-minute video lecture. Delve into topics such as TPM chips, endorsement keys, storage root keys, and the Coppersmith attack. Learn about Apple's T2 chip, disk encryption techniques, and the importance of entropy in security systems. Gain insights into BitLocker and methods for measuring entropy, enhancing your understanding of eSecurity and trusted host environments.

Syllabus

Intro
Boot state
TPM chip
Endorsement keys
Storage root keys
Coppersmith attack
T2 chip
Apple
Disk Encryption
eSecurity Encryption
eSecurity Performance
BitLocker
Entropy
Measuring entropy
Summary


Taught by

Bill Buchanan OBE

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network