TCG and OST2 Partner to Deliver TPM Usage Training and Develop Cybersecurity Experts

Cybersecurity curriculum has been developed to help individuals understand, develop and utilize the Trusted Platform Module (TPM).
Published: March 11, 2024

Software developers and students interested in device security will be given the chance to develop their cybersecurity skills and enhance the security of devices through a new technical security training program from the Trusted Computing Group (TCG) and OpenSecurityTraining2 (OST2).

The comprehensive curriculum “has been developed to help individuals understand, develop and effectively utilize the Trusted Platform Module (TPM), the secure crypto-processor establishing secure operations in over two billion devices worldwide,” according to the joint announcement.

Under the agreement, OST2 “will develop a series of hands-on, lab-driven classes, starting with ‘Trusted Computing 1101: Introductory TPM Usage’ (TC1101),” the announcement says.

The course requires no prior experience of working with TPMs and features more than 15 practical exercises for professionals and students to gain real-life experience of the critical technology.

SSI Newsletter

“As we mark the 25th anniversary of our first TPM specification, and in an age where cybersecurity experts are in short supply, we are delighted to be working with OST2 to develop an exciting new training curriculum,” says TCG president Joe Pennisi in the joint announcement.

“TPMs are key to giving devices robust hardware-based protection rather than just software security and are a cornerstone of trusted computing,” he says. “Alongside OST2, we hope the course will ensure greater awareness and understanding of how TPMs are used to safeguard sensitive data and fortify device security.”

Inside the Training

Participants will learn how to leverage the technology to bolster both software and hardware security, according to the joint announcement. They will discover how to safeguard cryptographic operations to effectively address vulnerabilities and enhance the security of cryptographic keys.

“OST2 cares deeply about improving the state of cybersecurity,” says OST2 founder Xeno Kovah in the joint announcement. “Increasing the adoption of hardware-backed security like the TPM is key to having trustworthy computing systems.

“We are excited to work with the TCG on the creation of free classes to teach thousands of new developers and security engineers how to interact with and utilize TPMs,” he says.

The course “also encourages participation in the TPM.dev Users Group, in which developers will gain insights into TPM utilization and are given the opportunity to harness their skills to enhance the security of exiting software using the TPM,” the joint announcement says.

“The implementation of TPM security requires a vast set of skills, often taking several months or even years of training,” added TC1101 instructor and founder of TPM.dev Dimi Tomov. “However, our new course greatly reduces the time and expense associated with TPM adoption, which will help develop security skillsets and increase the security of devices worldwide.”

Strategy & Planning Series
Strategy & Planning Series
Strategy & Planning Series
Strategy & Planning Series