First Principles: Robust Data Breach Protection with OCI Zero Trust Packet Routing
Offered By: Oracle via YouTube
Course Description
Overview
Explore Oracle's innovative solution for critical security gaps in this 22-minute video featuring Pradeep Vincent and Dr. Danny Hillis. Dive into the architecture of OCI Zero Trust Packet Routing (ZPR), which embeds security policy constraints into the network layer, ensuring data protection even when network configurations change. Learn about the challenges in cloud network security, the flaws in current network security paradigms, and how ZPR addresses these issues. Discover the performance-security tradeoffs, ZPR's potential as an open standard, and its application in real-world scenarios. Gain insights into how security holes occur, how ZPR prevents data leaks from network configuration errors, and the benefits of its human-readable policy language. Understand the technical aspects of ZPR "under the hood" and walk away with key takeaways for implementing robust data breach protection in your organization.
Syllabus
- OCI Zero Trust Packet Routing ZPR
- Cloud Network Security Challenge
- Welcome Dr. Danny Hillis
- The flaw in network security paradigm
- How would we design a modern internet?
- What’s the big idea behind ZPR?
- ZPR performance security tradeoff
- ZPR as an open standard
- Example application with security best practices
- Robust network and security configuration
- How security holes happen
- Data leaks from errors in network configuration
- ZPR: next generation security platform
- Supremo example activating ZPR
- Writing one or more ZPR policies
- ZPR protects data despite network policy errors
- ZPR offers human readable policy language
- ZPR under the hood
- Key Takeaways
Taught by
Oracle
Tags
Related Courses
Architecting Microsoft Azure SolutionsMicrosoft via edX Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam Network Security
Georgia Institute of Technology via Udacity Microsoft Professional Orientation : Cloud Administration
Microsoft via edX Cyber Threats and Attack Vectors
University of Colorado System via Coursera