-
-
Glossary (terminology)
-
A. What will we learn? (1 Question)
This content is graded -
B. When to use a Trusted Platform Module (TPM)? (1 Question)
This content is graded -
C. Setting up a TPM2 development environment (1 Question)
This content is graded -
Time Collection A-C - What, Why, and How (2 Questions)
This content is graded
-
-
-
D. Using TPM for signing and sealing (7 Questions)
This content is graded -
Time Collection D - Using TPM for signing and sealing (2 Questions)
This content is graded -
E. Using TPM for HMAC and hashing (7 Questions)
This content is graded -
Time Collection E - Using TPM for HMAC and hashing (2 Questions)
This content is graded -
F. Secure storage on the TPM (5 Questions)
This content is graded -
Time Collection F - Secure storage on the TPM (2 Questions)
This content is graded -
G. TPM's protection against Machine-in-the-middle (MITM) attacks (7 Questions)
This content is graded -
Time Collection G - TPM's protection against Machine-in-the-middle (MITM) attacks (2 Questions)
This content is graded -
H. Protecting external data using a TPM (5 Questions)
This content is graded -
Time Collection H - Protecting external data using a TPM (2 Questions)
This content is graded -
I. TPM internals and capabilities (5 Questions)
This content is graded -
Time Collection I - TPM internals and capabilities (2 Questions)
This content is graded
-
-
-
J. Using a TSS API to generate keys (8 Questions)
This content is graded -
Time Collection J - Using a TSS API to generate keys (2 Questions)
This content is graded -
K. Using a TSS API to enable MITM protection (4 Questions)
This content is graded -
Time Collection K - Using a TSS API to enable MITM protection (2 Questions)
This content is graded
-