Conditional Access IICovers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Monitoring with Icinga2Explores the monitoring of a new VM and the use of Icinga2 for critical alerts and incident management.
Cryptography: General FrameworkExplores the principles of cryptography, encryption, and information security, emphasizing confidentiality, integrity, and responsibility.
Encryption Project: Scratch BasicsCovers the basics of starting an encryption project using Scratch and provides step-by-step guidance on implementing encryption techniques.