YoVDO

Applicability of BPF in a Confidential Computing Context

Offered By: Linux Foundation via YouTube

Tags

Cybersecurity Courses Cloud Computing Courses Network Security Courses Privacy Courses Data Protection Courses System Architecture Courses Confidential Computing Courses Berkeley Packet Filter Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the applicability of Berkeley Packet Filter (BPF) in the context of Confidential Computing in this informative 27-minute talk by Dave Thaler. Gain insights into how BPF technology can be leveraged to enhance security and privacy in confidential computing environments. Learn about the potential benefits, challenges, and implementation considerations of integrating BPF with confidential computing solutions. Discover practical use cases and real-world examples that demonstrate the synergy between BPF and confidential computing techniques. Enhance your understanding of cutting-edge security approaches and their implications for modern computing infrastructures.

Syllabus

Applicability of BPF in a Confidential Computing context - Dave Thaler


Taught by

Linux Foundation

Tags

Related Courses

Software as a Service
University of California, Berkeley via Coursera
Software Defined Networking
Georgia Institute of Technology via Coursera
Pattern-Oriented Software Architectures: Programming Mobile Services for Android Handheld Systems
Vanderbilt University via Coursera
Web-Technologien
openHPI
Données et services numériques, dans le nuage et ailleurs
Certificat informatique et internet via France Université Numerique