text
hidden text to trigger early load of fonts ПродукцияПродукцияПродукцияПродукция Các sản phẩmCác sản phẩmCác sản phẩmCác sản phẩm المنتجاتالمنتجاتالمنتجاتالمنتجات מוצריםמוצריםמוצריםמוצרים

Cloud Security

-- Generating

If download hasn't started

Program Overview

6 Courses

Share With

Learn how to get performance on demand by using Intel® QuickAssist Technology (Intel® QAT). The course covers cryptographic ciphers, hash, authentication and public key cryptography. Then the course delves into Intel® QuickAssist Technology (Intel® QAT) networking capabilities before wrapping up with the basic methods used in common lossless compression and decompression algorithms.

This course focuses on confidential computing, what it is, and how the Intel technologies such as Intel® SGX and Intel® TDX can be applied. Also covered is their availability in Intel® hardware and in cloud services.

This course guides you through the process of implementing microcode updates, provides insights on the role of the microcode update (MCU) and why to late load a newer version. Also covered is how to identify Linux tools to simplify MCU checks and how to fetch the latest MCU files.

This course on cybersecurity policies and regulations provides an overview of regulatory and policy themes related to the cloud. Covered are topics such as the legal landscape of security regulations, the future of security regulations global trends driving cyber law.

(Chapter 1 out of 1)

This course delves into securing IoT edge devices with Intel® technology. Explore some IoT-specific use cases across various industries and explore Intel security strategies from both a hardware and software perspective. Then, walk through an overview of a specific hardware, and security technology available on internet platforms, and cover some of the security solutions from Edge to Cloud.

Security is a topic that is continually among the top three CIO challenges when moving to the cloud. This course provides an overview of what security is and how it applies to cloud computing, some best practices and practical application methods, typical technical controls that can be applied, and the trade-off in basic security controls, and addresses Intel’s value-add through our products and solutions to help you keep secure.