YoVDO

Confidential Computing - Why It Has to Be Cloud and Open

Offered By: Linux Foundation via YouTube

Tags

Confidential Computing Courses Cryptography Courses Data Protection Courses Cloud Security Courses Supply Chain Security Courses Trusted Execution Environment Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn about Confidential Computing, a cutting-edge technology that protects data in use by performing computations in hardware-based, attested Trusted Execution Environments. Explore how this innovative approach can enhance security for supply chains, reduce vulnerabilities, and provide greater cryptographic assurance. Discover the availability of Confidential Computing in silicon from major manufacturers and its implementation across various cloud platforms. Gain insights into the importance of open-source development in this field and learn about the work of the Confidential Computing Consortium, a Linux Foundation project. Understand how Confidential Computing can revolutionize data protection before, during, and after deployment, and find out how to get involved in this rapidly evolving technology sector.

Syllabus

Confidential Computing: Why It Has to Be Cloud, and It Has to Be Open - Mike Bursell


Taught by

Linux Foundation

Tags

Related Courses

Confidential Computing in Cloud and Edge
RSA Conference via YouTube
The Rise of Confidential Computing
RSA Conference via YouTube
Enabling Rack-Scale Confidential Computing Using Heterogeneous Trusted Execution Environment
IEEE via YouTube
Architectural Extensions for Hardware Virtual Machine Isolation to Advance Confidential Computing in Public Clouds
Linux Foundation via YouTube
The Open Enclave SDK - Confidential Computing with Trusted Apps
Linux Foundation via YouTube