Introduction to Trusted Computing

Introduction to Trusted Computing

http://opensecuritytraining.info/IntroToTrustedComputing.html

Assumes: Familiarity with basic security concepts such as public key cryptography at a high level; the class contains a review, but people who've never done any security work before will be lost.

Teaches: What TPMs and Trusted Computing are; what they are (and aren't) good for, including why they're not actually Treacherous Computing; what the TPM's capabilities are in detail; and how to make use of TPMs yourself.

Presented by