Confidential Computing - Why It Has to Be Cloud and Open
Offered By: Linux Foundation via YouTube
Course Description
Overview
Learn about Confidential Computing, a cutting-edge technology that protects data in use by performing computations in hardware-based, attested Trusted Execution Environments. Explore how this innovative approach can enhance security for supply chains, reduce vulnerabilities, and provide greater cryptographic assurance. Discover the availability of Confidential Computing in silicon from major manufacturers and its implementation across various cloud platforms. Gain insights into the importance of open-source development in this field and learn about the work of the Confidential Computing Consortium, a Linux Foundation project. Understand how Confidential Computing can revolutionize data protection before, during, and after deployment, and find out how to get involved in this rapidly evolving technology sector.
Syllabus
Confidential Computing: Why It Has to Be Cloud, and It Has to Be Open - Mike Bursell
Taught by
Linux Foundation
Tags
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Cryptography II
Stanford University via Coursera Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera Cryptography I
Stanford University via Coursera Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera