Confidential Computing in Cloud and Edge
Offered By: RSA Conference via YouTube
Course Description
Overview
Explore the world of Confidential Computing in cloud and edge environments through this 46-minute webcast from RSA Conference. Learn about Trusted Execution Environments (TEEs) that protect code and data from modification and disclosure. Discover how this computing model is being implemented at scale in cloud and edge settings. Gain insights from industry experts Joseprabu Inbaraj and Mourad Cherfaoui as they discuss the security landscape, design principles, and use cases for Confidential Computing. Delve into topics such as hardware-assisted virtualization, integrity protection, and programmability. Examine real-world applications like Confidential AI for Healthcare and understand the properties of TEEs, including units of isolation and attestation flows. Conclude with key takeaways and audience questions to deepen your understanding of this crucial technology in modern computing environments.
Syllabus
Introduction
Agenda
Problem Statement
Security Landscape
Goal
Concerns
Sensitive Data
Hardware Assisted Virtualization
Integrity Protection
Design Principles
Trusted Execution Environment TEA
HSM
Trusted Protection Modules
Programmability
Use Cases
Confidential AI for Healthcare
Confidential Computing
Trusted Execution Environment Properties
Unit of Isolation
Programmable Te
Implementation Solutions
Trusted Execution
attestation flows
field examples
What is good to have
Combined example
Tee example
Key takeaways
Audience questions
Closing remarks
Taught by
RSA Conference
Related Courses
Software as a ServiceUniversity of California, Berkeley via Coursera Software Defined Networking
Georgia Institute of Technology via Coursera Pattern-Oriented Software Architectures: Programming Mobile Services for Android Handheld Systems
Vanderbilt University via Coursera Web-Technologien
openHPI Données et services numériques, dans le nuage et ailleurs
Certificat informatique et internet via France Université Numerique