Confidential Computing in Cloud and Edge
Offered By: RSA Conference via YouTube
Course Description
Overview
Explore the world of Confidential Computing in cloud and edge environments through this 46-minute webcast from RSA Conference. Learn about Trusted Execution Environments (TEEs) that protect code and data from modification and disclosure. Discover how this computing model is being implemented at scale in cloud and edge settings. Gain insights from industry experts Joseprabu Inbaraj and Mourad Cherfaoui as they discuss the security landscape, design principles, and use cases for Confidential Computing. Delve into topics such as hardware-assisted virtualization, integrity protection, and programmability. Examine real-world applications like Confidential AI for Healthcare and understand the properties of TEEs, including units of isolation and attestation flows. Conclude with key takeaways and audience questions to deepen your understanding of this crucial technology in modern computing environments.
Syllabus
Introduction
Agenda
Problem Statement
Security Landscape
Goal
Concerns
Sensitive Data
Hardware Assisted Virtualization
Integrity Protection
Design Principles
Trusted Execution Environment TEA
HSM
Trusted Protection Modules
Programmability
Use Cases
Confidential AI for Healthcare
Confidential Computing
Trusted Execution Environment Properties
Unit of Isolation
Programmable Te
Implementation Solutions
Trusted Execution
attestation flows
field examples
What is good to have
Combined example
Tee example
Key takeaways
Audience questions
Closing remarks
Taught by
RSA Conference
Related Courses
Fog Networks and the Internet of ThingsPrinceton University via Coursera AWS IoT: Developing and Deploying an Internet of Things
Amazon Web Services via edX Business Considerations for 5G with Edge, IoT, and AI
Linux Foundation via edX 5G Strategy for Business Leaders
Linux Foundation via edX Intel® Edge AI Fundamentals with OpenVINO™
Intel via Udacity