SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsTrusted computing incorporates security at the core of a computing platform (PC, PDA, cell phone, etc.) by providing a unique identity, cryptographic capabilities and secure storage. The trusted platform can help ensure the validity of a system by creating a 'foundation of trust for software processes'.1 This paper focusing on the Trusted Computing Group's standards will provide an overview of trusted computing as it stands today: its methods applications possible pitfalls and current implementations.