Monitoring with Icinga2Explores the monitoring of a new VM and the use of Icinga2 for critical alerts and incident management.
IT Security ChallengesExplores IT security challenges, Object Storage systems, website management transition, network security deployment, and project portfolio management at EPFL.
Security Protocols in PracticeExplores the practical implementation of security protocols using the biometric passport as a case study, covering vulnerabilities, TLS evolution, and ChaChaPoly encryption.
Conditional Access IICovers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.