Curated Video
Real-World DevOps Project From Start to Finish - iRedMail - Part 6
In this video, we will explore advanced topics in iRedMail administration, including troubleshooting common issues, managing server backups, and implementing additional security measures. This clip is from the chapter "iRedMail" of the...
Curated Video
Real-World DevOps Project From Start to Finish - certbot, ACME protocol, wildcard TLS certificates
This video will dive into certbot, the ACME protocol, and wildcard TLS certificates. You will learn to install and configure certbot, obtain TLS certificates for servers and applications, and automate the certificate renewal process. We...
Curated Video
AWS Tutorial AWS Solutions Architect and SysOps Administrator - S3 Encryption
This video talks about S3 encryption. This clip is from the chapter "Key Management Service - Generate and Manage AWS Encryption Keys" of the series "AWS Tutorial: AWS Solutions Architect and SysOps Administrator".This section focuses on...
Curated Video
AWS Tutorial AWS Solutions Architect and SysOps Administrator - EBS Volume Encryption
This video explains EBS volume encryption. This clip is from the chapter "Key Management Service - Generate and Manage AWS Encryption Keys" of the series "AWS Tutorial: AWS Solutions Architect and SysOps Administrator".This section...
Curated Video
AWS Tutorial AWS Solutions Architect and SysOps Administrator - KMS Architecture
This video talks about the KMS architecture. This clip is from the chapter "Key Management Service - Generate and Manage AWS Encryption Keys" of the series "AWS Tutorial: AWS Solutions Architect and SysOps Administrator".This section...
Curated Video
SkillSprints: Identity Theft
Every day thousands of people have their identitiy stolen. Often, that theft occurs due to poor digital skills. In this video, learn what you can do to prevent online identity theft.
Curated Video
DKIM Email Security
In this tutorial, you will learn about DKIM and how to set it up on your DNS server.
Curated Video
Setup a Stealthy Command and Control Center Online
This video will teach you how to setup a command and control center over the internet to start you actual attacks
Curated Video
Symetric and Assymetric Encryption
This video will differentiate between the two main types of encryption
Curated Video
AWS Certified Data Analytics Specialty 2021 – Hands-On - S3 Encryption (Reminder)
This video explains the concept of encryption in Amazon Web Services (AWS). This clip is from the chapter "Domain 6: Security" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will learn about...
Curated Video
AWS Certified Data Analytics Specialty 2021 – Hands-On - S3 Encryption – Hands-On
This video is a practical video where we will demonstrate S3 encryption. This clip is from the chapter "Domain 2: Storage" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will learn about the...
Curated Video
AWS Certified Data Analytics Specialty 2021 – Hands-On - S3 Encryption
This video explains the concept of Amazon S3 encryption. This clip is from the chapter "Domain 2: Storage" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will learn about the various AWS...
Curated Video
AWS Certified Data Analytics Specialty 2021 – Hands-On - KMS Overview
This video provides an overview of AWS KMS. This clip is from the chapter "Domain 6: Security" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will learn about Amazon Web Services (AWS)...
Curated Video
How to Protect Your Data
This video introduces different techniques on how to protect your data
Curated Video
AWS Certified Data Analytics Specialty 2021 – Hands-On - Kinesis Security
This video explains the concept of security in Amazon Kinesis data streams. This clip is from the chapter "Domain 1: Collection" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will learn to...
Blockchain Central
Private and Public Keys Explained
This week on Blockchain Central: we’ll talk about private and public keys, see how they are used, and why they matter in the world of crypto. We will also have a look at the level of safety that asymmetric encryption provides and how it...
Blockchain Central
Private and Public Keys Explained | Blockchain Central
This week on Blockchain Central: we'll talk about private and public keys, see how they are used, and why they matter in the world of crypto. We will also have a look at the level of safety that asymmetric encryption provides and how it...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Data Protection
Data is not all the same. Whether data is at rest, in use, or in transit will affect how you can best secure it. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Symmetric Cryptosystems
In this episode, Mike describes encrypting and decrypting data with the same key. He also covers how symmetric algorithms can either be block or streaming and use various types of ciphers depending on which one is used. This clip is from...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Cryptographic Methods
This episode introduces various methods used to protect the critical keys in cryptography that keep communication secure. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total...
Curated Video
AWS Certified Cloud Practitioner (CLF-C01)- Elastic Block Store (EBS)
In this video, we'll learn about Elastic Block Store (EBS). This clip is from the chapter "AWS Compute Services" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for 2021]".This section is about AWS compute services in...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Understanding Digital Certificates
Digital certificates are used in many different places to verify the identity of a public key owner. They can also include verification from third parties for an added layer of security. This clip is from the chapter "Cryptography" of...
IDG TECHtalk
Setting up DLP features for email
Network World contributing editor David Strom provides a roundup of how to enable data leak prevention features on three email security platforms.
Curated Video
Bug Bounty Program Certification 11.4: Find Bugs in Coding Files and Break Algorithm
This video will help you find algorithm and complete the task. • Analyze source code to find algorithm used • Find out encryption key • Complete the task to encrypt the string