Fail-over and High-Availability (Explained by Example)
12
The Bare-Bones of a Service Mesh Proxy
13
Scaling and Securing WebSockets with HAProxy
14
Sidecar Proxy Pros & Cons (Explained by Example)
15
Setup Active-Passive Cluster with Keepalived & HAProxy (Two raspberry pis)
16
Active-Active vs Active-Passive Cluster to Achieve High Availability in Scaling Systems
17
What is a DDOS Mitigating Reverse Proxy and is it Worth It? (Commenting on a Security Now Video)
18
Traefik Crash Course (Without docker)
19
NginX Crash Course
20
Envoy Proxy Crash Course, Architecture, L7 & L4 Proxying, HTTP/2, Enabling TLS 1.2/1.3 and more
21
How HTTP Tunneling works, The CONNECT method, Pros & Cons and more
22
Envoy Proxy Fixes Two Zero Day vulnerabilities (UDP Proxy, TCP Proxy) - CVE-2020-35470
23
Capture, Analyze and Debug HTTPS traffic with MITMProxy
24
Load Balance multiple RTMP Servers to Horizontally Scale Streaming (Node Media Server and HAProxy)
25
How timeouts can make or break your Backend load balancers
26
Getting Started with HAProxy Runtime API to Remove Backends for Maintenance Remotely and More
27
Can you Max-out the Connections between Load Balancer and Backend Servers?
Description:
Dive into an extensive 14-hour course on load balancing, proxies, and reverse proxies. Explore the differences between proxy and reverse proxy servers, VPNs, and HTTP proxies. Learn about layer 4 and layer 7 proxying, SSL/TLS termination, and TLS forward proxy. Master popular tools like Varnish, HAProxy, NginX, and Envoy Proxy through comprehensive crash courses. Understand concepts such as fail-over, high-availability, service mesh proxies, and sidecar proxies. Set up active-passive clusters with Keepalived and HAProxy, and compare active-active vs. active-passive cluster architectures. Discover DDOS mitigating reverse proxies, HTTP tunneling, and how to capture and analyze HTTPS traffic. Gain practical knowledge on load balancing RTMP servers, managing timeouts, and utilizing HAProxy Runtime API for backend maintenance. Taught by Hussein Nasser, this course covers a wide range of topics essential for understanding and implementing proxy technologies in modern network architectures.