YoVDO

Confidential Containers Explained

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Cloud Native Computing Courses Cloud Security Courses Data Privacy Courses Containerization Courses Kubernetes Security Courses Confidential Computing Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore confidential containers and cloud native confidential computing in this 38-minute panel discussion featuring experts from IBM and Apple. Learn about the Confidential Containers project, its impact on cloud native user experience, and how it leverages various hardware platforms and technologies to standardize confidential computing at the container level. Discover the benefits of this technology, its implications for Kubernetes protection, and deployment strategies for confidential workloads using familiar tools and workflows. Gain insights into new considerations and concepts introduced by confidential containers, and understand the future direction of this complex technology. The panel also addresses questions and discusses recent developments since the project's initial presentation.

Syllabus

Introduction
Project Definition
Confidential Computing
How Does It Protect Kubernetes
Deploy Confidential Containers
Why Do We Care
What Next
Questions


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Confidential Computing in Cloud and Edge
RSA Conference via YouTube
The Rise of Confidential Computing
RSA Conference via YouTube
Enabling Rack-Scale Confidential Computing Using Heterogeneous Trusted Execution Environment
IEEE via YouTube
Architectural Extensions for Hardware Virtual Machine Isolation to Advance Confidential Computing in Public Clouds
Linux Foundation via YouTube
The Open Enclave SDK - Confidential Computing with Trusted Apps
Linux Foundation via YouTube