YoVDO

What Is Needed to Build Trusted Infrastructures

Offered By: Red Hat via YouTube

Tags

Red Hat Summit Courses Cybersecurity Courses Blockchain Development Courses Data Protection Courses Quantum Cryptography Courses Containerization Courses Infrastructure Security Courses Trusted Platform Module Courses

Course Description

Overview

Explore evolving concepts in trusted infrastructure security during this 40-minute breakout session from Red Hat Summit 2017. Gain insights from industry experts as they discuss moving beyond traditional security measures like STIG compliance and two-factor authentication. Delve into advanced data protection methods such as tokenization, Trusted Platform Modules, and trusted boot. Examine emerging cryptographic models including quantum cryptography and blockchain. Learn how these concepts apply to containerization and serverless computing, and discover open source approaches to addressing modern security challenges. The session covers topics like continuous monitoring, cyber security, patching strategies, cloud migration, and application software security. Understand the importance of automated testing, SCAP implementation, and effective roadmapping in building robust, trusted infrastructures for government and education sectors.

Syllabus

Intro
What is needed to build trusted infrastructures
Continuous monitoring
Cyber security
State of patching
Cloud migration
Application software
Common threads
Time limits
Automated test battery
SCAP
Roadmap
GitHub
People Tracking


Taught by

Red Hat

Related Courses

AZ-500 Microsoft Azure Security Technologies
A Cloud Guru
Azure Cosmos DB Deep Dive
A Cloud Guru
Google Cloud Certified Professional Cloud Security Engineer
A Cloud Guru
Microsoft Azure Architect Design - Exam AZ-301 (LA)
A Cloud Guru
Red Hat Certified Engineer (RHEL 8 RHCE)
A Cloud Guru