YoVDO

First Principles: Robust Data Breach Protection with OCI Zero Trust Packet Routing

Offered By: Oracle via YouTube

Tags

Network Security Courses Cloud Security Courses Security Policies Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore Oracle's innovative solution for critical security gaps in this 22-minute video featuring Pradeep Vincent and Dr. Danny Hillis. Dive into the architecture of OCI Zero Trust Packet Routing (ZPR), which embeds security policy constraints into the network layer, ensuring data protection even when network configurations change. Learn about the challenges in cloud network security, the flaws in current network security paradigms, and how ZPR addresses these issues. Discover the performance-security tradeoffs, ZPR's potential as an open standard, and its application in real-world scenarios. Gain insights into how security holes occur, how ZPR prevents data leaks from network configuration errors, and the benefits of its human-readable policy language. Understand the technical aspects of ZPR "under the hood" and walk away with key takeaways for implementing robust data breach protection in your organization.

Syllabus

- OCI Zero Trust Packet Routing ZPR
- Cloud Network Security Challenge
- Welcome Dr. Danny Hillis
- The flaw in network security paradigm
- How would we design a modern internet?
- What’s the big idea behind ZPR?
- ZPR performance security tradeoff
- ZPR as an open standard
- Example application with security best practices
- Robust network and security configuration
- How security holes happen
- Data leaks from errors in network configuration
- ZPR: next generation security platform
- Supremo example activating ZPR
- Writing one or more ZPR policies
- ZPR protects data despite network policy errors
- ZPR offers human readable policy language
- ZPR under the hood
- Key Takeaways


Taught by

Oracle

Tags

Related Courses

An Introduction to Computer Networks
Stanford University via Independent
Computer Networks
University of Washington via Coursera
Computer Networking
Georgia Institute of Technology via Udacity
Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Model Building and Validation
AT&T via Udacity