![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
Overview
![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
This course aims to teach learners about working with trusted hardware in cloud computing environments. By leveraging the Trusted Platform Module (TPM) chip, students will learn how to ensure the integrity of the hardware platform running virtual workloads. The course covers topics such as secure storage of keys, data, certificates, and cryptographic functions. Students will also explore practical challenges faced when setting up a trusted cloud with TPM 2.0 hardware, including implementing a software stack, remote attestation infrastructure, and adapting systems to evolving open-source software. The intended audience for this course includes professionals working in cloud computing, virtualization, cybersecurity, and system administration.
Syllabus
A trusted trip in the cloud – working with trusted hardware (…) - Gabriela Limonta - code::dive 2018
Taught by
code::dive conference