YoVDO

Confidential Computing: From Host to Workload

Offered By: DevConf via YouTube

Tags

Confidential Computing Courses Virtualization Courses Data Protection Courses Cloud Security Courses Virtual Machines Courses Containerization Courses Trusted Platform Module Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of Confidential Computing in this comprehensive 41-minute conference talk from DevConf.CZ 2023. Dive into the technologies enabling data protection in virtual machines, including memory encryption. Follow a step-by-step walkthrough from setting up a machine to running containerized workloads that leverage confidential computing. Learn about machine setup options for on-premise and cloud environments, explore various architectures for running workloads, and understand the process of preparing and encrypting images. Gain insights into running secure workloads, including attestations, virtual TPM, and other crucial security considerations. Speaker Christophe de Dinechin guides you through the complexities of implementing Confidential Computing, providing valuable knowledge for IT professionals and developers seeking to enhance data protection in their virtual environments.

Syllabus

Confidential Computing, from host to workload - DevConf.CZ 2023


Taught by

DevConf

Related Courses

Confidential Computing in Cloud and Edge
RSA Conference via YouTube
The Rise of Confidential Computing
RSA Conference via YouTube
Enabling Rack-Scale Confidential Computing Using Heterogeneous Trusted Execution Environment
IEEE via YouTube
Architectural Extensions for Hardware Virtual Machine Isolation to Advance Confidential Computing in Public Clouds
Linux Foundation via YouTube
The Open Enclave SDK - Confidential Computing with Trusted Apps
Linux Foundation via YouTube