Program Overview
The Security program provides overviews of multiple security focused hardware and software technologies from Intel and the open source community. The first course provides an overview of Cryptography, and it’s importance throughout history in addition to its impact in our digital world today.
21 Courses
Share With
OVERVIEW
Intel SGX DCAP is the solution for deploying Intel SGX services into data centers, but that solution is intended to be customized for the target environment. And because every environment has unique needs, the DCAP software is distributed as components rather than a complete solution.
OVERVIEW
In this course, John Mechalas, Compute Performance and Developer Products, takes a closer look at the Data Center Caching Service and how it removes barriers for enterprise environments and data centers with restricted internet access.
Secure Cloud Native Network Platform (3 Chapters)
OVERVIEW
In this course, Intel Product Manager, Heqing Zhu, and Platform Architect, David Lu, provide an in-depth overview of using Intel® Security Libraries for Data Center (Intel® SecL-DC) to build an end to end platform security solution with a Kubernetes cluster.
OVERVIEW
In this course, John Mechalas, Compute Performance and Developer Products, examines the components in the Intel® Software Guard Extensions Data Center Attestation Primitives package, and how its components are used to provision and attest Intel® SGX platforms.
OVERVIEW
In this course, John Mechalas, Compute Performance and Developer Products, introduces Intel® Software Guard Extensions Data Center Attestation Primitives, or Intel® SGX DCAP.
OVERVIEW
In this course, Bill Carlson, Solutions Architect at Intel, discusses the three pillars of Intel Security Technologies: Securing the Platform, Protecting the Data and Securing Workloads.
OVERVIEW
In this course, Bill Carlson, Solutions Architect at Intel, addresses the basic concerns that communications service providers have in cybersecurity and introduces Intel’s data center security strategy and technologies roadmap.
Cybersecurity Overview – Part 4: Future Topics (4 Chapters)
OVERVIEW
In this course professor, Dr. Adam Doupé discusses research into blockchain, phone scams and fraud.
Cybersecurity Overview – Part 3: Internet Protocol (7 Chapters)
OVERVIEW
In this course Dr. Adam Doupé, presents an overview of Cybersecurity and Internet Protocol.
OVERVIEW
In this course, Carlos Rubio-Medrano, Ph.D., provides an overview of cybersecurity authorization and the access control models of Role Based Access Control (RBAC) and Attribute Based Access Control (ABAC).
Cybersecurity Overview – Part 1: Basic Concepts (5 Chapters)
OVERVIEW
In this course, Carlos Rubio-Medrano, Ph.D., discusses cybersecurity and its basic concepts. He then examines the components of cybersecurity, specific threats and provides an overview of cybersecurity policy.
OVERVIEW
Intel® Corp is heavily invested in the Enterprise blockchain space and this course helps to educate on which blockchain approach addresses customer needs as well as leveraging improved security, privacy and scalability in this technology space.
Intel® SGX Card (1 Chapters)
OVERVIEW
There’s a lot of concern with data privacy and this is being addressed by a method called Confidential Computing. This involves encrypting data throughout its lifecycle. Intel has worked to bring a new technology called Intel ® Software Guard Extensions (Intel® SGX) that allows for an encrypted enclave for application code in data to be - loaded into and accessed from - that is separate from the system. Due to the present demand for this technology, Intel has introduced the Intel® SGX Card for customers that can’t land a Xeon E3, single socket, 1U chassis in their data centers.
Blockchain and Intel® (1 Chapters)
OVERVIEW
Learn about Blockchain technology and how Intel is contributing to the adoption of this technology
Intel® SGX 101 (2 Chapters)
OVERVIEW
Intel® SGX is a new security technology offered by Intel. Watch the video above to get a good overview of this technology, its mode of application and its various uses cases.
Intel® QuickAssist Technology Programming (9 Chapters)
OVERVIEW
In this course, users learn how to get started using Intel® QuickAssist Technology (QAT) devices to offload packet encryption and decryption in your DPDK application. Users also learn the necessary steps to install, program, and debug the Intel® QuickAssist Technology Software package and test configurations.
Data Encryption 103: Cryptography Basics (1 Chapters)
OVERVIEW
In this course, Intel® Software Product Marketing Manager, Mark Chambers, provides an overview of cryptography, including a look at every day security, the history of cryptography, common ciphers and modes of operation, hashing and messaging authentication and public key cryptography.
Hyperscan Overview (1 Chapters)
OVERVIEW
In this course, Intel Segment Manager for Network Security and Applications, Sab Gosal, provides an overview of the open source pattering matching software Hyperscan. Details are also provided on the possible use cases of this versatile software.
Cryptography Basics (1 Chapters)
OVERVIEW
This course provides a general overview of cryptography and its impact on the modern world as well as throughout history. In this course you’ll also gain a better understanding of where cryptography is being leveraged to enhance your security and privacy online.
OVERVIEW
In this animated video, Intel Cloud Builders University participants learn how Intel® Quick Assist Technology can extend cloud and data center capacity securely and improve storage application performance with hardware-based data compression.
Intel® Platform Security Technology (1 Chapters)
OVERVIEW
In this video, Markus Leberecht, Intel Senior Data Center Solution Architect, provides an understanding of platform security and how to mix different ingredients from both Intel and HyTrust, to provide trusted secure nodes for your data center.