eSecurity - Trusted Hosts
Offered By: Bill Buchanan OBE via YouTube
Course Description
Overview
Explore the critical aspects of trusted computing and secure boot processes in this 31-minute video lecture. Delve into topics such as TPM chips, endorsement keys, storage root keys, and the Coppersmith attack. Learn about Apple's T2 chip, disk encryption techniques, and the importance of entropy in security systems. Gain insights into BitLocker and methods for measuring entropy, enhancing your understanding of eSecurity and trusted host environments.
Syllabus
Intro
Boot state
TPM chip
Endorsement keys
Storage root keys
Coppersmith attack
T2 chip
Apple
Disk Encryption
eSecurity Encryption
eSecurity Performance
BitLocker
Entropy
Measuring entropy
Summary
Taught by
Bill Buchanan OBE
Related Courses
Statistical Molecular ThermodynamicsUniversity of Minnesota via Coursera Thermodynamics
Indian Institute of Technology Bombay via edX Introduzione alla fisica sperimentale: meccanica, termodinamica
Politecnico di Milano via Polimi OPEN KNOWLEDGE Statistical Thermodynamics: Molecules to Machines
Carnegie Mellon University via Coursera Engineering Thermodynamics
Indian Institute of Technology Kanpur via Swayam