Instructional Video3:52
Curated Video

Getting Started with HashiCorp Nomad - Secure Gossip Encryption

Higher Ed
In this video, we will understand the concept of gossip encryption. We will understand the use of encryption keys and how federation requires the same key on all other data centers.
<
br/>
This clip is from the chapter "Securing...
Instructional Video14:49
Curated Video

HashiCorp Certified - Vault Associate Course - Lab—Transit Secrets Engine

Higher Ed
This is a lab video on Transit Secrets Engine.<br<br/>/>

This clip is from the chapter "Compare and Configure Secrets Engines" of the series "HashiCorp Certified - Vault Associate Course".null
Instructional Video10:03
Curated Video

Alteryx Advanced - In-Database

Higher Ed
In this video, we will explore in-database processing, which enables blending and analysis of large datasets without moving the data from the database. You will learn to use the input tool and the different data sources that support...
Instructional Video8:15
Curated Video

Real-World DevOps Project From Start to Finish - Traefik - Part 2

Higher Ed
Continuing from Part 1, we will dive deeper into Traefik's configuration options. We will explore advanced routing techniques, including path-based routing and URL rewriting. Also, discover how to configure HTTPS with Let's Encrypt and...
Instructional Video11:29
Curated Video

Real-World DevOps Project From Start to Finish - iRedMail - Part 6

Higher Ed
In this video, we will explore advanced topics in iRedMail administration, including troubleshooting common issues, managing server backups, and implementing additional security measures.
<
br/>
This clip is from the chapter...
Instructional Video11:13
Curated Video

Real-World DevOps Project From Start to Finish - certbot, ACME protocol, wildcard TLS certificates

Higher Ed
This video will dive into certbot, the ACME protocol, and wildcard TLS certificates. You will learn to install and configure certbot, obtain TLS certificates for servers and applications, and automate the certificate renewal process....
Instructional Video1:30
Curated Video

AWS Tutorial AWS Solutions Architect and SysOps Administrator - S3 Encryption

Higher Ed
This video talks about S3 encryption.
<
br/>
This clip is from the chapter "Key Management Service - Generate and Manage AWS Encryption Keys" of the series "AWS Tutorial: AWS Solutions Architect and SysOps Administrator".This...
Instructional Video2:03
Curated Video

AWS Tutorial AWS Solutions Architect and SysOps Administrator - EBS Volume Encryption

Higher Ed
This video explains EBS volume encryption.
<
br/>
This clip is from the chapter "Key Management Service - Generate and Manage AWS Encryption Keys" of the series "AWS Tutorial: AWS Solutions Architect and SysOps Administrator".This...
Instructional Video5:18
Curated Video

AWS Tutorial AWS Solutions Architect and SysOps Administrator - KMS Architecture

Higher Ed
This video talks about the KMS architecture.
<
br/>
This clip is from the chapter "Key Management Service - Generate and Manage AWS Encryption Keys" of the series "AWS Tutorial: AWS Solutions Architect and SysOps Administrator".This...
Instructional Video4:18
Curated Video

SkillSprints: Identity Theft

Pre-K - Higher Ed
Every day thousands of people have their identitiy stolen. Often, that theft occurs due to poor digital skills. In this video, learn what you can do to prevent online identity theft.
Instructional Video4:28
Curated Video

DKIM Email Security

Higher Ed
In this tutorial, you will learn about DKIM and how to set it up on your DNS server.
Instructional Video6:02
Curated Video

Setup a Stealthy Command and Control Center Online

Higher Ed
This video will teach you how to setup a command and control center over the internet to start you actual attacks
Instructional Video3:56
Curated Video

Symetric and Assymetric Encryption

Higher Ed
This video will differentiate between the two main types of encryption
Instructional Video7:48
Curated Video

AWS Certified Data Analytics Specialty 2021 – Hands-On - S3 Encryption (Reminder)

Higher Ed
This video explains the concept of encryption in Amazon Web Services (AWS).
<
br/>
This clip is from the chapter "Domain 6: Security" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will...
Instructional Video5:58
Curated Video

AWS Certified Data Analytics Specialty 2021 – Hands-On - S3 Encryption – Hands-On

Higher Ed
This video is a practical video where we will demonstrate S3 encryption.
<
br/>
This clip is from the chapter "Domain 2: Storage" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will learn...
Instructional Video6:50
Curated Video

AWS Certified Data Analytics Specialty 2021 – Hands-On - S3 Encryption

Higher Ed
This video explains the concept of Amazon S3 encryption.
<
br/>
This clip is from the chapter "Domain 2: Storage" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will learn about the...
Instructional Video6:04
Curated Video

AWS Certified Data Analytics Specialty 2021 – Hands-On - KMS Overview

Higher Ed
This video provides an overview of AWS KMS.
<
br/>
This clip is from the chapter "Domain 6: Security" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will learn about Amazon Web Services...
Instructional Video2:03
Curated Video

How to Protect Your Data

Higher Ed
This video introduces different techniques on how to protect your data
Instructional Video1:15
Curated Video

AWS Certified Data Analytics Specialty 2021 – Hands-On - Kinesis Security

Higher Ed
This video explains the concept of security in Amazon Kinesis data streams.
<
br/>
This clip is from the chapter "Domain 1: Collection" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will...
Instructional Video5:26
Blockchain Central

Private and Public Keys Explained

Higher Ed
This week on Blockchain Central: we’ll talk about private and public keys, see how they are used, and why they matter in the world of crypto. We will also have a look at the level of safety that asymmetric encryption provides and how it...
Instructional Video5:26
Blockchain Central

Private and Public Keys Explained | Blockchain Central

Higher Ed
This week on Blockchain Central: we'll talk about private and public keys, see how they are used, and why they matter in the world of crypto. We will also have a look at the level of safety that asymmetric encryption provides and how it...
Instructional Video8:37
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Data Protection

Higher Ed
Data is not all the same. Whether data is at rest, in use, or in transit will affect how you can best secure it.
r/>
This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total...
Instructional Video12:42
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Symmetric Cryptosystems

Higher Ed
In this episode, Mike describes encrypting and decrypting data with the same key. He also covers how symmetric algorithms can either be block or streaming and use various types of ciphers depending on which one is used.
r/>
...
Instructional Video7:20
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Cryptographic Methods

Higher Ed
This episode introduces various methods used to protect the critical keys in cryptography that keep communication secure.
r/>
This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601:...