TLS: Transport Layer SecurityExplores the evolution and vulnerabilities of TLS, emphasizing the enhancements in TLS 1.3 and the role of certificate authorities.
Monitoring with Icinga2Explores the monitoring of a new VM and the use of Icinga2 for critical alerts and incident management.
Cryptography BasicsCovers authentication, authorization, encryption techniques, vulnerabilities, and the impact of quantum computing on cryptography.
SSL Deployment in EPFLCovers the process of SSL deployment in EPFL, including generating certificate requests and deploying certificates to servers.
Conditional Access IICovers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Cryptography - HTTPSExplains the significance of HTTPS for secure communication over insecure networks and the essentials of asymmetric cryptography.
Cryptography: public keyExplains public-key cryptography, digital signatures, and key distribution for secure communication.