Are Our Systems Using Up-to-Date Cryptography?
Offered By: Linux Foundation via YouTube
Course Description
Overview
Explore the critical importance of maintaining up-to-date cryptography in this 29-minute conference talk by Daiki Ueno from Red Hat. Discover an innovative approach to auditing algorithm usage in system deployments, designed to detect legacy algorithms without compromising performance or privacy. Learn about the implementation of USDT (user statically defined tracepoints) and eBPF programs for event tracing, as well as the use of eBPF ringbuffer and io_ring for asynchronous processing with privacy-preserving logging. Gain insights into the practical applications of this methodology, expanding on the initial presentation at DevConf.CZ 2023, and understand how to keep your systems secure with the latest cryptographic standards.
Syllabus
Are Our Systems Using up-to-Date Cryptography? - Daiki Ueno, Red Hat
Taught by
Linux Foundation
Tags
Related Courses
Linux Server Management and SecurityUniversity of Colorado System via Coursera Cybersecurity Roles, Processes & Operating System Security
IBM via Coursera Operating Systems and Security
IBM via edX Linux Security and Hardening, The Practical Security Guide.
Udemy The Complete Cyber Security Course : Hackers Exposed!
Udemy