YoVDO

Securing Edge Applications and Infrastructure: Top Considerations and Automated Approaches

Offered By: Red Hat Ansible Automation via YouTube

Tags

Edge Computing Courses Application Security Courses Device Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical security considerations for edge computing in this 40-minute talk from Red Hat Ansible Automation. Learn about the top security challenges faced when deploying applications and devices in distributed locations with limited IT resources. Discover recent findings from infrastructure managers, enterprise architects, and IoT specialists regarding their primary concerns for securing distributed infrastructure and applications. Examine Red Hat's approach to addressing these security issues and understand how an automated, consistent strategy for modernizing infrastructure can support edge use cases while minimizing attack surfaces and security risks. Gain valuable insights into scaling your edge computing initiatives securely and efficiently.

Syllabus

Thinking about edge? Think about security!


Taught by

Red Hat Ansible Automation

Related Courses

Fog Networks and the Internet of Things
Princeton University via Coursera
AWS IoT: Developing and Deploying an Internet of Things
Amazon Web Services via edX
Business Considerations for 5G with Edge, IoT, and AI
Linux Foundation via edX
5G Strategy for Business Leaders
Linux Foundation via edX
Intel® Edge AI Fundamentals with OpenVINO™
Intel via Udacity