TLS and Certificate AuthoritiesExplores the evolution of TLS protocols, the role of certificate authorities, vulnerabilities in outdated encryption, and real-world certificate-related attacks.
Cryptography BasicsCovers authentication, authorization, encryption techniques, vulnerabilities, and the impact of quantum computing on cryptography.
Monitoring with Icinga2Explores the monitoring of a new VM and the use of Icinga2 for critical alerts and incident management.
Conditional Access IICovers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.