YoVDO

What Is Needed to Build Trusted Infrastructures

Offered By: Red Hat via YouTube

Tags

Red Hat Summit Courses Cybersecurity Courses Blockchain Development Courses Data Protection Courses Quantum Cryptography Courses Containerization Courses Infrastructure Security Courses Trusted Platform Module Courses

Course Description

Overview

Explore evolving concepts in trusted infrastructure security during this 40-minute breakout session from Red Hat Summit 2017. Gain insights from industry experts as they discuss moving beyond traditional security measures like STIG compliance and two-factor authentication. Delve into advanced data protection methods such as tokenization, Trusted Platform Modules, and trusted boot. Examine emerging cryptographic models including quantum cryptography and blockchain. Learn how these concepts apply to containerization and serverless computing, and discover open source approaches to addressing modern security challenges. The session covers topics like continuous monitoring, cyber security, patching strategies, cloud migration, and application software security. Understand the importance of automated testing, SCAP implementation, and effective roadmapping in building robust, trusted infrastructures for government and education sectors.

Syllabus

Intro
What is needed to build trusted infrastructures
Continuous monitoring
Cyber security
State of patching
Cloud migration
Application software
Common threads
Time limits
Automated test battery
SCAP
Roadmap
GitHub
People Tracking


Taught by

Red Hat

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network