YoVDO

Confidential Computing - Why It Has to Be Cloud and Open

Offered By: Linux Foundation via YouTube

Tags

Confidential Computing Courses Cryptography Courses Data Protection Courses Cloud Security Courses Supply Chain Security Courses Trusted Execution Environment Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn about Confidential Computing, a cutting-edge technology that protects data in use by performing computations in hardware-based, attested Trusted Execution Environments. Explore how this innovative approach can enhance security for supply chains, reduce vulnerabilities, and provide greater cryptographic assurance. Discover the availability of Confidential Computing in silicon from major manufacturers and its implementation across various cloud platforms. Gain insights into the importance of open-source development in this field and learn about the work of the Confidential Computing Consortium, a Linux Foundation project. Understand how Confidential Computing can revolutionize data protection before, during, and after deployment, and find out how to get involved in this rapidly evolving technology sector.

Syllabus

Confidential Computing: Why It Has to Be Cloud, and It Has to Be Open - Mike Bursell


Taught by

Linux Foundation

Tags

Related Courses

Applied Cryptography
University of Virginia via Udacity
Cryptography II
Stanford University via Coursera
Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera
Cryptography I
Stanford University via Coursera
Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera