Confidential Computing in Cloud and Edge
Offered By: RSA Conference via YouTube
Course Description
Overview
Explore the world of Confidential Computing in cloud and edge environments through this 46-minute webcast from RSA Conference. Learn about Trusted Execution Environments (TEEs) that protect code and data from modification and disclosure. Discover how this computing model is being implemented at scale in cloud and edge settings. Gain insights from industry experts Joseprabu Inbaraj and Mourad Cherfaoui as they discuss the security landscape, design principles, and use cases for Confidential Computing. Delve into topics such as hardware-assisted virtualization, integrity protection, and programmability. Examine real-world applications like Confidential AI for Healthcare and understand the properties of TEEs, including units of isolation and attestation flows. Conclude with key takeaways and audience questions to deepen your understanding of this crucial technology in modern computing environments.
Syllabus
Introduction
Agenda
Problem Statement
Security Landscape
Goal
Concerns
Sensitive Data
Hardware Assisted Virtualization
Integrity Protection
Design Principles
Trusted Execution Environment TEA
HSM
Trusted Protection Modules
Programmability
Use Cases
Confidential AI for Healthcare
Confidential Computing
Trusted Execution Environment Properties
Unit of Isolation
Programmable Te
Implementation Solutions
Trusted Execution
attestation flows
field examples
What is good to have
Combined example
Tee example
Key takeaways
Audience questions
Closing remarks
Taught by
RSA Conference
Related Courses
Master Mathematical Cryptography 2020: Crack Any CodeUdemy Cryptography from Scratch| Master Cryptography in Java
Udemy Information Security in Python
Udemy Cryptography
Caleb Curry via YouTube Linux for Programmers - Public-Private Key Authentication (RSA) and FTP
Tech with Tim via YouTube