YoVDO

Confidential Computing - Why It Has to Be Cloud and Open

Offered By: Linux Foundation via YouTube

Tags

Confidential Computing Courses Cryptography Courses Data Protection Courses Cloud Security Courses Supply Chain Security Courses Trusted Execution Environment Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn about Confidential Computing, a cutting-edge technology that protects data in use by performing computations in hardware-based, attested Trusted Execution Environments. Explore how this innovative approach can enhance security for supply chains, reduce vulnerabilities, and provide greater cryptographic assurance. Discover the availability of Confidential Computing in silicon from major manufacturers and its implementation across various cloud platforms. Gain insights into the importance of open-source development in this field and learn about the work of the Confidential Computing Consortium, a Linux Foundation project. Understand how Confidential Computing can revolutionize data protection before, during, and after deployment, and find out how to get involved in this rapidly evolving technology sector.

Syllabus

Confidential Computing: Why It Has to Be Cloud, and It Has to Be Open - Mike Bursell


Taught by

Linux Foundation

Tags

Related Courses

IoT Product Security
Cybrary
Trusted Execution Environments Meet the Blockchain
Simons Institute via YouTube
Cache Side Channel Attack - Exploitability and Countermeasures
Black Hat via YouTube
Confidential Computing in Cloud and Edge
RSA Conference via YouTube
The Rise of Confidential Computing
RSA Conference via YouTube