YoVDO

What Is Needed to Build Trusted Infrastructures

Offered By: Red Hat via YouTube

Tags

Red Hat Summit Courses Cybersecurity Courses Blockchain Development Courses Data Protection Courses Quantum Cryptography Courses Containerization Courses Infrastructure Security Courses Trusted Platform Module Courses

Course Description

Overview

Explore evolving concepts in trusted infrastructure security during this 40-minute breakout session from Red Hat Summit 2017. Gain insights from industry experts as they discuss moving beyond traditional security measures like STIG compliance and two-factor authentication. Delve into advanced data protection methods such as tokenization, Trusted Platform Modules, and trusted boot. Examine emerging cryptographic models including quantum cryptography and blockchain. Learn how these concepts apply to containerization and serverless computing, and discover open source approaches to addressing modern security challenges. The session covers topics like continuous monitoring, cyber security, patching strategies, cloud migration, and application software security. Understand the importance of automated testing, SCAP implementation, and effective roadmapping in building robust, trusted infrastructures for government and education sectors.

Syllabus

Intro
What is needed to build trusted infrastructures
Continuous monitoring
Cyber security
State of patching
Cloud migration
Application software
Common threads
Time limits
Automated test battery
SCAP
Roadmap
GitHub
People Tracking


Taught by

Red Hat

Related Courses

Innovation and Technology Management in Tourism and Hospitality
Hong Kong Polytechnic University via edX
Das liebe Geld - Finance im Alltag
University of Zurich via Coursera
Blockchain in the Energy Sector
InnoEnergy via FutureLearn
IBM Blockchain Foundation for Developers
IBM via Coursera
Cryptography And Network Security
Indian Institute of Technology, Kharagpur via Swayam