TCG and OST2 Partner to Deliver TPM Usage Training and Develop New Cybersecurity Experts

Date Published: March, 11, 2024

Software developers and students interested in device security will be given the chance to develop their cybersecurity skills and enhance the security of devices through a new technical security training program from the Trusted Computing Group (TCG) and OpenSecurityTraining2 (OST2).

The comprehensive curriculum has been developed to help individuals understand, develop and effectively utilize the Trusted Platform Module (TPM), the secure crypto-processor establishing secure operations in over two billion devices worldwide. Under the agreement, OST2 will develop a series of hands-on, lab-driven classes, starting with ‘Trusted Computing 1101: Introductory TPM Usage’ (TC1101). The course requires no prior experience of working with TPMs and features more than 15 practical exercises for professionals and students to gain real-life experience of the critical technology.

“As we mark the 25th anniversary of our first TPM specification, and in an age where cybersecurity experts are in short supply, we are delighted to be working with OST2 to develop an exciting new training curriculum,” said TCG President Joe Pennisi. “TPMs are key to giving devices robust hardware-based protection rather than just software security and are a cornerstone of trusted computing. Alongside OST2, we hope the course will ensure greater awareness and understanding of how TPMs are used to safeguard sensitive data and fortify device security.”

Offering practical insights into innovative TPM applications, participants will learn how to leverage the technology to bolster both software and hardware security. They will discover how to safeguard cryptographic operations to effectively address vulnerabilities and enhance the security of cryptographic keys.

“OST2 cares deeply about improving the state of cybersecurity. Increasing the adoption of hardware-backed security like the TPM is key to having trustworthy computing systems,” said OST2 founder Xeno Kovah. “We are excited to work with the TCG on the creation of free classes to teach thousands of new developers and security engineers how to interact with and utilize TPMs.”

The course also encourages participation in the TPM.dev Users Group, in which developers will gain insights into TPM utilization and are given the opportunity to harness their skills to enhance the security of exiting software using the TPM.

“The implementation of TPM security requires a vast set of skills, often taking several months or even years of training,” added TC1101 instructor and founder of TPM.dev Dimi Tomov. “However, our new course greatly reduces the time and expense associated with TPM adoption, which will help develop security skillsets and increase the security of devices worldwide.”

For more information about the educational content, please visit the TCG website.

– ENDS –

About TCG

TCG is a not-for-profit organization formed to develop, define and promote open, vendor-neutral, global industry specifications and standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms.

TCG enables secure computing through open standards and specifications. Benefits of TCG include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity. More than a billion devices include TCG technologies.

X: @TrustedComputin

LinkedIn: https://www.linkedin.com/company/trusted-computing-group/

About OpenSecurityTraining2

OST2 is a 501(c)3 charity, offering a range of free multi-day courses designed to enhance professionals’ skills and knowledge in the field of cybersecurity. For more information visit: https://ost2.fyi/

X: @OpenSecTraining

LinkedIn: https://www.linkedin.com/company/ost2

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More