Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Repeatable Supply Chain Security Failures in Firmware Key Management

RSA Conference via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore critical supply chain security vulnerabilities in firmware key management through analysis of significant real-world incidents that have compromised the foundation of trust in modern computing systems. Learn how trust chains spanning hardware, firmware, and operating systems can be broken through key management failures, with detailed examination of repeatable attack patterns and vulnerabilities discovered by security researchers. Understand the step-by-step processes that establish and maintain system integrity, and discover how attackers exploit weaknesses in these trust mechanisms to compromise entire computing environments. Gain insights into the systematic nature of these security failures and their impact on supply chain security across the technology industry.

Syllabus

Repeatable Supply Chain Security Failures in Firmware Key Management

Taught by

RSA Conference

Reviews

Start your review of Repeatable Supply Chain Security Failures in Firmware Key Management

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.