TLS: Transport Layer SecurityExplores the evolution and vulnerabilities of TLS, emphasizing the enhancements in TLS 1.3 and the role of certificate authorities.
Monitoring with Icinga2Explores the monitoring of a new VM and the use of Icinga2 for critical alerts and incident management.
Cryptography BasicsCovers authentication, authorization, encryption techniques, vulnerabilities, and the impact of quantum computing on cryptography.