YoVDO

Confidential Computing - Why It Has to Be Cloud and Open

Offered By: Linux Foundation via YouTube

Tags

Confidential Computing Courses Cryptography Courses Data Protection Courses Cloud Security Courses Supply Chain Security Courses Trusted Execution Environment Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn about Confidential Computing, a cutting-edge technology that protects data in use by performing computations in hardware-based, attested Trusted Execution Environments. Explore how this innovative approach can enhance security for supply chains, reduce vulnerabilities, and provide greater cryptographic assurance. Discover the availability of Confidential Computing in silicon from major manufacturers and its implementation across various cloud platforms. Gain insights into the importance of open-source development in this field and learn about the work of the Confidential Computing Consortium, a Linux Foundation project. Understand how Confidential Computing can revolutionize data protection before, during, and after deployment, and find out how to get involved in this rapidly evolving technology sector.

Syllabus

Confidential Computing: Why It Has to Be Cloud, and It Has to Be Open - Mike Bursell


Taught by

Linux Foundation

Tags

Related Courses

Architecting Microsoft Azure Solutions
Microsoft via edX
Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam
Network Security
Georgia Institute of Technology via Udacity
Microsoft Professional Orientation : Cloud Administration
Microsoft via edX
Cyber Threats and Attack Vectors
University of Colorado System via Coursera