Exploring the core principles and concepts of Confidential Computing, and how it compares to other Privacy Enhancing Technologies (PETs)
Exploring the various types and levels of security vulnerabilities
Overview of security threat modelling for a non-technical audience, and an introduction to the STRIDE model
Exploring different hash technologies, and the potential risks in using hashes wrongly or for the wrong purpose
How VPNs are used, how they evolved and contrasting VPNs with end-to-end encryption