Monitoring with Icinga2Explores the monitoring of a new VM and the use of Icinga2 for critical alerts and incident management.
TLS and Certificate AuthoritiesExplores the evolution of TLS protocols, the role of certificate authorities, vulnerabilities in outdated encryption, and real-world certificate-related attacks.
TLS: Transport Layer SecurityExplores the evolution and vulnerabilities of TLS, emphasizing the enhancements in TLS 1.3 and the role of certificate authorities.
Cryptography - HTTPSExplains the significance of HTTPS for secure communication over insecure networks and the essentials of asymmetric cryptography.
Cryptography BasicsCovers authentication, authorization, encryption techniques, vulnerabilities, and the impact of quantum computing on cryptography.