Login to filter by course Login to filter by course Reset
Monitoring with Icinga2Explores the monitoring of a new VM and the use of Icinga2 for critical alerts and incident management.
Encryption Project: Scratch BasicsCovers the basics of starting an encryption project using Scratch and provides step-by-step guidance on implementing encryption techniques.
Cryptography: General FrameworkExplores the principles of cryptography, encryption, and information security, emphasizing confidentiality, integrity, and responsibility.
Conditional Access IICovers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Encryption Key UsageCovers the usage of encryption keys in the context of image encryption using Scratch.
Cryptography BasicsCovers authentication, authorization, encryption techniques, vulnerabilities, and the impact of quantum computing on cryptography.
SwissCovid and PrivacyExplores SwissCovid encryption, key verification, and privacy challenges in contact tracing.
Decentralized Systems EngineeringExplores decentralized systems engineering, covering database initialization, reliable messaging, consensus algorithms, and encryption protocols.
ECB Penguin and HashingExplores symmetric encryption, social engineering, and secure hashing techniques, focusing on ECB vulnerabilities and SHA-256 usage.