X

The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

Program Overview

The Security program provides overviews of multiple security focused hardware and software technologies from Intel and the open source community. The first course provides an overview of Cryptography, and it’s importance throughout history in addition to its impact in our digital world today.


In this animated video, Intel Cloud Builders University participants learn how Intel® Quick Assist Technology can extend cloud and data center capacity securely and improve storage application performance with hardware-based data compression.


In this video, Markus Leberecht, Intel Senior Data Center Solution Architect, provides an understanding of platform security and how to mix different ingredients from both Intel and HyTrust, to provide trusted secure nodes for your data center.


This course provides a general overview of cryptography and its impact on the modern world as well as throughout history. In this course you’ll also gain a better understanding of where cryptography is being leveraged to enhance your security and privacy online.


In this course, Intel Segment Manager for Network Security and Applications, Sab Gosal, provides an overview of the open source pattering matching software Hyperscan. Details are also provided on the possible use cases of this versatile software.


In this course, Intel® Software Product Marketing Manager, Mark Chambers, provides an overview of cryptography, including a look at every day security, the history of cryptography, common ciphers and modes of operation, hashing and messaging authentication and public key cryptography.


In this course, users learn how to get started using Intel® QuickAssist Technology (QAT) devices to offload packet encryption and decryption in your DPDK application. Users also learn the necessary steps to install, program, and debug the Intel® QuickAssist Technology Software package and test configurations.


Intel® SGX is a new security technology offered by Intel. Watch the video above to get a good overview of this technology, its mode of application and its various uses cases.


Learn about Blockchain technology and how Intel is contributing to the adoption of this technology


There’s a lot of concern with data privacy and this is being addressed by a method called Confidential Computing. This involves encrypting data throughout its lifecycle. Intel has worked to bring a new technology called Intel ® Software Guard Extensions (Intel® SGX) that allows for an encrypted enclave for application code in data to be - loaded into and accessed from - that is separate from the system. Due to the present demand for this technology, Intel has introduced the Intel® SGX Card for customers that can’t land a Xeon E3, single socket, 1U chassis in their data centers.


Intel® Corp is heavily invested in the Enterprise blockchain space and this course helps to educate on which blockchain approach addresses customer needs as well as leveraging improved security, privacy and scalability in this technology space.


In this course, Carlos Rubio-Medrano, Ph.D., discusses cybersecurity and its basic concepts. He then examines the components of cybersecurity, specific threats and provides an overview of cybersecurity policy.


In this course, Carlos Rubio-Medrano, Ph.D., provides an overview of cybersecurity authorization and the access control models of Role Based Access Control (RBAC) and Attribute Based Access Control (ABAC).


In this course Dr. Adam Doupé, presents an overview of Cybersecurity and Internet Protocol.


In this course professor, Dr. Adam Doupé discusses research into blockchain, phone scams and fraud.


In this course, Bill Carlson, Solutions Architect at Intel, addresses the basic concerns that communications service providers have in cybersecurity and introduces Intel’s data center security strategy and technologies roadmap.


In this course, Bill Carlson, Solutions Architect at Intel, discusses the three pillars of Intel Security Technologies:  Securing the Platform, Protecting the Data and Securing Workloads. 


In this course, John Mechalas, Compute Performance and Developer Products, introduces Intel® Software Guard Extensions Data Center Attestation Primitives, or Intel® SGX DCAP.


In this course, John Mechalas, Compute Performance and Developer Products, examines the components in the Intel® Software Guard Extensions Data Center Attestation Primitives package, and how its components are used to provision and attest Intel® SGX platforms.


In this course, Intel Product Manager, Heqing Zhu, and Platform Architect, David Lu, provide an in-depth overview of using Intel® Security Libraries for Data Center (Intel® SecL-DC) to build an end to end platform security solution with a Kubernetes cluster.


In this course, John Mechalas, Compute Performance and Developer Products, takes a closer look at the Data Center Caching Service and how it removes barriers for enterprise environments and data centers with restricted internet access.