Trusted Computing Course

Course

Online

£ 244.13 VAT inc.

*Indicative price

Original amount in EUR:

280 €

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

The English expression Trusted Computing refers to a nascent technology, derived from specifications of the Trusted Computing Group (TCG), inherited, in turn, from those of the Trusted Computing Platform Alliance (TCPA). The main objective of this technology is to make devices, such as computers or mobile phones leaving the factory, guaranteed against any tampering such as the presence of extraneous codes or other, through the use of appropriate hardware and software. This purpose is achieved by inserting a chip, called Trusted Platform Module, in each device, equipped with a pair of unique cryptographic keys for each chip, impossible to modify even by the owner, and capable of generating other keys for data encryption or devices. At the basis of Trusted Computing there are asymmetric encryption mechanisms applied for the following purposes: each single device is uniquely identified by a sort of electronic passport, the information can be encrypted and signed with the machine key and, finally, the encryption of the information is performed at the hardware level in secure mode. The TPM unit, according to the specifications of the Trusted Computing Group, will have five main functionalities. Each has a different purpose, although they can be used together. However, for them to be active, the software in use must also implement support. These features are: Endorsement Key, Secure I / O, Memory curtaining,

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Emagister S.L. (data controller) will process your data to carry out promotional activities (via email and/or phone), publish reviews, or manage incidents. You can learn about your rights and manage your preferences in the privacy policy.

Reviews

Subjects

  • Computing

Course programme

I MODULE: Trusted Computing technology: a generator of asymmetric keys and random numbers. General characteristics and epistemiology of the term II MODULE: Trusted Computing support: Linux support for version 2.6.13 and BitLocker Drive Encryption in Windows Vista also for programs developed by third parties MODULE III: Trusted Computing applications: secure computer networks, hard disk encryption and Linux security module written to ensure the safety of the operating system MODULE IV: Possible applications of Trusted Computing: protection from viruses and spy programs, cheating prevention measures in online games and phishing protection MODULE V: Supporters and detractors to implement BitLocker Drive Encryption technology and hard disk encryption MODULE VI:

Trusted Computing Course

£ 244.13 VAT inc.

*Indicative price

Original amount in EUR:

280 €