Monitoring with Icinga2Explores the monitoring of a new VM and the use of Icinga2 for critical alerts and incident management.
IT Security ChallengesExplores IT security challenges, Object Storage systems, website management transition, network security deployment, and project portfolio management at EPFL.
Cybersecurity FundamentalsCovers the basics of cybersecurity, including the importance of protecting systems from digital attacks and the motivation behind cybercrimes.
Conditional Access IICovers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
IT Security FundamentalsCovers the basics of IT security, emphasizing everyone's responsibility in protecting data and preventing cyber threats.