YoVDO

Confidential Computing: From Host to Workload

Offered By: DevConf via YouTube

Tags

Confidential Computing Courses Virtualization Courses Data Protection Courses Cloud Security Courses Virtual Machines Courses Containerization Courses Trusted Platform Module Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of Confidential Computing in this comprehensive 41-minute conference talk from DevConf.CZ 2023. Dive into the technologies enabling data protection in virtual machines, including memory encryption. Follow a step-by-step walkthrough from setting up a machine to running containerized workloads that leverage confidential computing. Learn about machine setup options for on-premise and cloud environments, explore various architectures for running workloads, and understand the process of preparing and encrypting images. Gain insights into running secure workloads, including attestations, virtual TPM, and other crucial security considerations. Speaker Christophe de Dinechin guides you through the complexities of implementing Confidential Computing, providing valuable knowledge for IT professionals and developers seeking to enhance data protection in their virtual environments.

Syllabus

Confidential Computing, from host to workload - DevConf.CZ 2023


Taught by

DevConf

Related Courses

Advanced Operating Systems
Georgia Institute of Technology via Udacity
Cloud Computing Applications, Part 1: Cloud Systems and Infrastructure
University of Illinois at Urbana-Champaign via Coursera
GT - Refresher - Advanced OS
Georgia Institute of Technology via Udacity
Introduction to Cloud Infrastructure Technologies
Linux Foundation via edX
Microsoft Windows Server 2012 Fundamentals: Hyper-V
Microsoft via edX