Email Security: Best PracticesDelves into email security statistics, filtering techniques, Cisco Email Security Appliance, authentication, web application access control, vulnerabilities, and antivirus infrastructure migration.
Monitoring with Icinga2Explores the monitoring of a new VM and the use of Icinga2 for critical alerts and incident management.
Modeling TerritoryCovers the modeling of territory through simplification and schematization.
Learning Sciences ConceptsExplores cognitive load, metacognition, learning environments, and inductive reasoning, with examples of exam questions and the city of Godthåb.