TCG and OST2 Partner to Deliver TPM Usage Training and Develop Cybersecurity Experts

Cybersecurity curriculum has been developed to help individuals understand, develop and utilize the Trusted Platform Module (TPM).

TCG and OST2 Partner to Deliver TPM Usage Training and Develop Cybersecurity Experts

Adobe Stock image by HTGanzo

Software developers and students interested in device security will be given the chance to develop their cybersecurity skills and enhance the security of devices through a new technical security training program from the Trusted Computing Group (TCG) and OpenSecurityTraining2 (OST2).

The comprehensive curriculum “has been developed to help individuals understand, develop and effectively utilize the Trusted Platform Module (TPM), the secure crypto-processor establishing secure operations in over two billion devices worldwide,” according to the joint announcement.

Under the agreement, OST2 “will develop a series of hands-on, lab-driven classes, starting with ‘Trusted Computing 1101: Introductory TPM Usage’ (TC1101),” the announcement says.

The course requires no prior experience of working with TPMs and features more than 15 practical exercises for professionals and students to gain real-life experience of the critical technology.

“As we mark the 25th anniversary of our first TPM specification, and in an age where cybersecurity experts are in short supply, we are delighted to be working with OST2 to develop an exciting new training curriculum,” says TCG president Joe Pennisi in the joint announcement.

“TPMs are key to giving devices robust hardware-based protection rather than just software security and are a cornerstone of trusted computing,” he says. “Alongside OST2, we hope the course will ensure greater awareness and understanding of how TPMs are used to safeguard sensitive data and fortify device security.”

Inside the Training

Participants will learn how to leverage the technology to bolster both software and hardware security, according to the joint announcement. They will discover how to safeguard cryptographic operations to effectively address vulnerabilities and enhance the security of cryptographic keys.

“OST2 cares deeply about improving the state of cybersecurity,” says OST2 founder Xeno Kovah in the joint announcement. “Increasing the adoption of hardware-backed security like the TPM is key to having trustworthy computing systems.

“We are excited to work with the TCG on the creation of free classes to teach thousands of new developers and security engineers how to interact with and utilize TPMs,” he says.

The course “also encourages participation in the Users Group, in which developers will gain insights into TPM utilization and are given the opportunity to harness their skills to enhance the security of exiting software using the TPM,” the joint announcement says.

“The implementation of TPM security requires a vast set of skills, often taking several months or even years of training,” added TC1101 instructor and founder of Dimi Tomov. “However, our new course greatly reduces the time and expense associated with TPM adoption, which will help develop security skillsets and increase the security of devices worldwide.”

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our FREE digital newsletters!

Security Is Our Business, Too

For professionals who recommend, buy and install all types of electronic security equipment, a free subscription to Commercial Integrator + Security Sales & Integration is like having a consultant on call. You’ll find an ideal balance of technology and business coverage, with installation tips and techniques for products and updates on how to add to your bottom line.

A FREE subscription to the top resource for security and integration industry will prove to be invaluable.

Subscribe Today!

Leave a Reply

Your email address will not be published. Required fields are marked *

Get Our Newsletters