Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#TLS
YouTube
education
#Mutual TLS
Showing:
155
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Linode
CI-CD Pipeline with GitLab and K8s - Jérôme Petazzoni LKE Helm Workshop
1
rewiews
Learn to set up a CI/CD pipeline using GitLab and Helm on Linode Kubernetes Engine. This workshop covers installation, configuration, and troubleshooting for efficient DevOps workflows.
Add to list
8
Lesons
36 minutes
On-Demand
Free-Video
Hussein Nasser
HTTP
0
rewiews
Comprehensive exploration of HTTP protocols, web servers, and related technologies, covering implementation, security, and performance optimization techniques.
Add to list
57
Lesons
23 hours
On-Demand
Free-Video
Hussein Nasser
Wiresharking All Protocols
0
rewiews
Dive deep into network protocols using Wireshark, exploring CURL, WebSockets, TLS, RabbitMQ, PostgreSQL, HTTP/2, Server-Sent Events, MongoDB, SSH, and NodeJS HTTP Server for enhanced understanding.
Add to list
10
Lesons
2 hours 30 minutes
On-Demand
Free-Video
Bogdan Stashchuk
SSL, TLS and HTTPS Overview
0
rewiews
Comprehensive overview of SSL, TLS, and HTTPS protocols, covering encryption methods, key exchange algorithms, and practical analysis using Wireshark.
Add to list
20
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Jeremy's IT Lab
CCNA - WAN Architectures - CCNA 200-301 Complete Course
0
rewiews
Explore WAN architectures including leased lines, MPLS, and Internet VPNs. Learn about site-to-site and remote-access VPNs, IPsec, and various internet connection types for network professionals.
Add to list
25
Lesons
38 minutes
On-Demand
Free-Video
Hussein Nasser
Mutual TLS - The Backend Engineering Show
0
rewiews
Explore Mutual TLS: encryption, authentication, advantages, and challenges in client-server communication. Gain insights into secure network protocols for backend development.
Add to list
9
Lesons
50 minutes
On-Demand
Free-Video
Hussein Nasser
How HAProxy Forwards 2 Million Requests Per Second - The Backend Engineering Show
0
rewiews
Detailed analysis of HAProxy's performance, exploring how it achieves 2 million HTTP requests per second on a 64-core ARM machine, covering latency, throughput, TCP connections, and core allocation.
Add to list
8
Lesons
47 minutes
On-Demand
Free-Video
Hussein Nasser
Making TLS Handshake More Secure - The New Encrypted Client Hello TLS Extension
0
rewiews
Explore the new Encrypted Client Hello TLS extension, its implementation, benefits, and potential limitations in enhancing TLS handshake security and privacy.
Add to list
5
Lesons
28 minutes
On-Demand
Free-Video
IEEE
Port Contention for Fun and Profit
0
rewiews
Explore SMT execution engine sharing as a side-channel leakage source, targeting ports to create a high-resolution timing side-channel for attacks on various architectures and applications.
Add to list
14
Lesons
22 minutes
On-Demand
Free-Video
IEEE
How Secure and Quick is QUIC? Provable Security and Performance Analyses
0
rewiews
Analyzes QUIC protocol's security and performance, revealing strengths and vulnerabilities. Explores trade-offs between latency reduction and robust security in this innovative transport protocol.
Add to list
14
Lesons
19 minutes
On-Demand
Free-Video
Hussein Nasser
Perfect Forward Secrecy in TLS Explained
0
rewiews
Explore Perfect Forward Secrecy in TLS, a crucial encryption property that safeguards past communications even if server keys are compromised, enhancing overall data security.
Add to list
6
Lesons
21 minutes
On-Demand
Free-Video
Hussein Nasser
The Pros and Cons of Encrypted Client Hello
0
rewiews
Explore the advantages and challenges of Encrypted Client Hello (ECH) in TLS, including its impact on privacy, security, and network infrastructure.
Add to list
9
Lesons
33 minutes
On-Demand
Free-Video
Linux Foundation
A Simple Protocol for Remote Attestation of System Integrity
0
rewiews
Explore a simplified remote attestation protocol for system integrity using TPM keys and IMA Digest Lists. Learn about innovative solutions for secure TLS handshakes and efficient integrity verification.
Add to list
20
Lesons
29 minutes
On-Demand
Free-Video
OWASP Foundation
Essential TLS Hardening for Better Web Security
0
rewiews
Explore essential TLS hardening techniques for enhanced web security with Justin Mayer, founder of Monitorial.com. Learn practical strategies to identify and address potential vulnerabilities in your web applications.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
OWASP Foundation
HTTPS Security Headers: HSTS, TLS, HPKP, and CSP Implementation - APPSEC CA 2017
0
rewiews
Comprehensive guide to implementing HTTPS using HSTS, TLS, HPKP, and CSP. Learn best practices for secure web communication from Salesforce security experts.
Add to list
1
Lesons
48 minutes
On-Demand
Free-Video
OWASP Foundation
Calm Down: HTTPS Is Not a VPN
0
rewiews
Explore HTTPS limitations, privacy concerns, and security implications in web communications. Learn about packet capture, fingerprinting, and potential vulnerabilities in encrypted connections.
Add to list
24
Lesons
46 minutes
On-Demand
Free-Video
OWASP Foundation
OCSP Stapling in the Wild - Lecture
0
rewiews
Explore OCSP stapling in the wild with experts Devdatta Akhawe and Emily Stark. Learn about TLS security, browser implementations, and real-world challenges in HTTPS ecosystems.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
OWASP Foundation
HTTPS and TLS Security Practices - Front Line Insights 2016
0
rewiews
Comprehensive overview of modern HTTPS and TLS security practices, covering protocol vulnerabilities, certificate fundamentals, and best practices for implementing strong encryption in web services.
Add to list
1
Lesons
1 hour 1 minute
On-Demand
Free-Video
OWASP Foundation
Getting a Handle on Mobile Security
0
rewiews
Comprehensive overview of mobile security challenges and best practices, covering encryption, data protection, and platform-specific concerns for developers building secure mobile applications.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
Okta
How Web Authentication Works: TLS, Password Hashing, OpenID Connect, OAuth 2, and JSON Web Tokens
0
rewiews
Explore the inner workings of web authentication, covering TLS, password hashing, OpenID Connect, OAuth 2, and JSON Web Tokens in this comprehensive overview.
Add to list
1
Lesons
40 minutes
On-Demand
Free-Video
Linux Foundation
Shhh - Stop Sharing Secrets: A Secure Mindset for Embedded Development
0
rewiews
Explore secure embedded development practices, focusing on encryption, authentication, and trusted execution environments to protect IoT devices and data.
Add to list
21
Lesons
43 minutes
On-Demand
Free-Video
Linux Foundation
Boot to Cloud Security Considerations for IoT Systems
0
rewiews
Comprehensive guide to designing secure IoT systems, covering boot processes, data flow, authentication, and cloud connectivity. Offers best practices for embedded developers using open-source software and standards.
Add to list
1
Lesons
38 minutes
On-Demand
Free-Video
Linux Foundation
OpenSSL After Heartbleed - Lessons Learned and Project Improvements
0
rewiews
Explore OpenSSL's transformation post-Heartbleed: enhanced team, transparency, development processes, and project vitality. Learn about security improvements and future plans.
Add to list
28
Lesons
55 minutes
On-Demand
Free-Video
OneMarcFifty
Securing Cloud Services with TLS X.509 Client Certificates
0
rewiews
Learn to secure cloud services using X.509 client certificates, from generating and deploying certificates to automating processes with OpenXPKI. Includes practical examples for MQTT and home automation.
Add to list
8
Lesons
16 minutes
On-Demand
Free-Video
NDC Conferences
Unlocking the Secrets of TLS - Understanding the TLS Handshake Process
0
rewiews
Explore the intricacies of TLS handshake, its evolution, and how secure connections are established on the Internet. Gain insights into past mistakes and lessons learned in this process.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
Linux Foundation
Driving the Need for Identity, Authentication, and Encryption in Containerized Environments
0
rewiews
Explore encryption, identity verification, and workload attestation in multi-service environments. Learn to implement TLS with Istio and cert-manager for robust identity management and secure communication.
Add to list
1
Lesons
1 hour 5 minutes
On-Demand
Free-Video
USENIX
mmTLS - Scaling the Performance of Encrypted Network Traffic Inspection
0
rewiews
Innovative framework for scalable TLS middleboxes, enhancing encrypted traffic inspection performance while preserving security. Outperforms existing solutions with minimal overhead and high throughput.
Add to list
1
Lesons
20 minutes
On-Demand
Free-Video
Code Sync
Building Trust in Open Networks - TLS Implementation Challenges
0
rewiews
Explore challenges and solutions in implementing TLS authenticity for Erlang/OTP, focusing on privacy, integrity, and security in open networks.
Add to list
1
Lesons
33 minutes
On-Demand
Free-Video
Linux Plumbers Conference
Attested TLS and Formalization
0
rewiews
Explore attested TLS and its formalization, gaining insights into secure communication protocols and their mathematical foundations.
Add to list
1
Lesons
19 minutes
On-Demand
Free-Video
Security BSides San Francisco
Insecurity Protocols - An Overview of Modern Authentication
0
rewiews
Explore modern authentication protocols like OpenID Connect, SAML, and WebAuthn. Learn their strengths, vulnerabilities, and real-world security implications in this comprehensive overview.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
BSides SATX
The Digital Trust Journey: From Key Generation to Signed Certificate
0
rewiews
Explore the creation process of digital certificates, from key generation to CA signing. Understand the critical steps ensuring trust and security in online interactions.
Add to list
1
Lesons
39 minutes
On-Demand
Free-Video
Practical Networking
TLS 1.3 Handshake - Major Changes from Prior Versions
0
rewiews
Explore major changes in TLS 1.3 handshake: shorter round trips, enhanced encryption, and improved key generation for better security and performance.
Add to list
11
Lesons
18 minutes
On-Demand
Free-Video
Yocto Project
Integrating VNC and Weston with the Yocto Project and OpenEmbedded
0
rewiews
Explore VNC support in Weston 12 for remote desktop sharing. Learn to build core-image-weston, set up TLS, and connect remotely using Vinagre in this step-by-step guide.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
A Deep Dive Into Advanced TLS for gRPC Services
0
rewiews
Explore advanced TLS API in gRPC, covering post-handshake verifications, custom root trust, certificate behavior, and revocation configuration for enhanced security in gRPC services.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
Linux Foundation
Spark Over a Mesos Secured Productive Environment
0
rewiews
Explore advanced Spark and Mesos integration for secure, isolated Big Data environments. Learn to enhance protection, manage secrets, and implement network solutions in enterprise-level deployments.
Add to list
28
Lesons
43 minutes
On-Demand
Free-Video
OpenInfra Foundation
Encrypting Internal Traffic with OpenStack-Ansible - A Security Implementation Guide
0
rewiews
Discover how to enhance OpenStack security by implementing encryption for internal and external traffic using OpenStack-Ansible, covering load balancer communication and service interactions.
Add to list
8
Lesons
19 minutes
On-Demand
Free-Video
Eclipse Foundation
Embedded Rust Development with Async Programming and IoT Integration
0
rewiews
Explore cutting-edge embedded Rust development featuring async programming, actor-based designs, networking stacks, and IoT capabilities through practical demonstrations and real-world applications.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
Rust
Curl with Rust: Adding Support for Rust Components - Daniel Stenberg
0
rewiews
Explore curl's Rust integration with creator Daniel Stenberg. Learn about HTTP backends, vulnerabilities, and the future of this widely-used tool.
Add to list
18
Lesons
41 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Linkerd End User Panel: Case Studies from Production
0
rewiews
Explore real-world Linkerd service mesh implementations across industries. Gain insights on encryption, load balancing, troubleshooting, and practical outcomes from diverse production environments.
Add to list
13
Lesons
37 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Service Mesh at Scale: How Xbox Cloud Gaming Secures 22,000 Pods with Linkerd
0
rewiews
Discover how Xbox Cloud Gaming secures 22k pods with Linkerd, implementing mTLS, observability, and reliability across 26 clusters. Learn about their journey, cost savings, and future plans.
Add to list
14
Lesons
22 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Mutual TLS on Kubernetes with Linkerd
0
rewiews
Explore implementing mutual TLS on Kubernetes using Linkerd, enhancing security and authentication for microservices communication in cloud-native environments.
Add to list
1
Lesons
1 hour 1 minute
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Zero Trust Networking in Practice with a Service Mesh - Workshop
0
rewiews
Practical workshop on implementing zero-trust network security in Kubernetes using service mesh. Covers encryption, authentication, authorization, PKI setup, and principle of least privilege.
Add to list
1
Lesons
1 hour 12 minutes
On-Demand
Free-Video
OWASP Foundation
Top 10 Security Best Practices for Securing Microservices
0
rewiews
Comprehensive guide to securing microservices, covering TLS, authentication, authorization, DDoS protection, monitoring, encryption, and more. Essential for developers and architects building scalable, secure APIs.
Add to list
14
Lesons
38 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Taming Attestation for Cloud Native Edge Security with Parsec
0
rewiews
Explore how Parsec simplifies hardware-backed security and attestation for edge devices, enabling secure communication with cloud services across diverse ecosystems.
Add to list
11
Lesons
30 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Flavors of Certificates in Service Mesh - The Whys and Hows
0
rewiews
Explore various certificate deployment options in Service Mesh security, with demonstrations using Istio for scenarios like external management, SPIFFE integration, and 5G Telco Cloud security.
Add to list
1
Lesons
34 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
gRPC Tapping Filter with Hardware Acceleration in Service Mesh
0
rewiews
Explore gRPC tapping filter optimization in service mesh, featuring streaming Grpc Sink and hardware-accelerated memory copy for improved performance and scalability in high-traffic microservice architectures.
Add to list
1
Lesons
32 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Overview and State of Linkerd
0
rewiews
Explore Linkerd's latest features, upcoming releases, and its comparison to other service meshes. Learn about its Rust micro-proxy and how to get involved in this popular CNCF project.
Add to list
12
Lesons
28 minutes
On-Demand
Free-Video
Android Developers
Keep it Secret, Keep it Safe: Android 6.0 Security Features - Android Dev Summit 2015
0
rewiews
Explore Android 6.0's new security features, best practices for data protection, and tools like StrictMode. Learn about TLS implementation, certificate verification, and handling legacy clients.
Add to list
40
Lesons
41 minutes
On-Demand
Free-Video
Android Developers
What's New in Android Security - Google I/O 2018
0
rewiews
Explore Android's latest security features, APIs, and best practices for protecting app integrity and data privacy. Learn about StrongBox, KeyStore types, and user data control.
Add to list
16
Lesons
32 minutes
On-Demand
Free-Video
Java
Making the JDK More Secure - New Features and Default Configuration
0
rewiews
Explore JDK 9's enhanced security features, including SHA-3, OCSP stapling, and DTLS. Learn about Oracle's efforts to strengthen Java's cryptographic algorithms and default security configurations.
Add to list
20
Lesons
44 minutes
On-Demand
Free-Video
Java
Keeping Your Java Applications Secure - Cryptographic Improvements and Best Practices
0
rewiews
Explore Java's cryptographic enhancements and secure coding practices to develop robust applications with strong security capabilities and protection against vulnerabilities.
Add to list
25
Lesons
37 minutes
On-Demand
Free-Video
Linux Foundation
gRPC and Go: Developing Efficient and Type-Safe Services
0
rewiews
Explore gRPC with Go for efficient, type-safe services. Learn service definition, code generation, API styles, streaming, REST integration, and security in this comprehensive tutorial.
Add to list
22
Lesons
42 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Tracing HTTP/2 Traffic Using gRPC Tapping Filter with Hardware Acceleration
0
rewiews
Explore advanced HTTP/2 traffic tracing techniques using gRPC tapping filter, enhanced with hardware acceleration for improved performance in microservice architectures.
Add to list
1
Lesons
32 minutes
On-Demand
Free-Video
SNIAVideo
Accelerating Encryption for Solid State Storage Drives
0
rewiews
Discover how hardware acceleration enhances encryption and decryption in SSD storage systems using RISC-V architecture, improving throughput and power efficiency through configurable design implementations.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
SNIAVideo
DPU as a Storage Initiator for Bare Metal Performance and Virtualization
0
rewiews
Discover how DPU-based Storage Initiators enhance NVMe/TCP performance, enabling bare-metal speeds for virtualized applications while providing encryption, compression, and seamless integration with orchestration systems.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
PKI and Certificate Management - Essentials for Production Security
0
rewiews
Explore PKI and certificate management essentials for secure network communication in dynamic production environments, focusing on microservices and service mesh implementations.
Add to list
13
Lesons
36 minutes
On-Demand
Free-Video
Linux Foundation
Demystifying Secure Application Communication with Zero Trust and Istio Without Sidecars
0
rewiews
Explore zero-trust architecture for cloud-native apps using mTLS and Istio's ambient mesh. Learn to secure multi-cluster communication without sidecars or app restarts.
Add to list
1
Lesons
37 minutes
On-Demand
Free-Video
Association for Computing Machinery (ACM)
Practical State Recovery Attacks Against Legacy RNG Implementations
0
rewiews
Systematic study of FIPS 140-2 certifications reveals vulnerabilities in ANSI X9.31 RNG implementations, highlighting risks of static keys and emphasizing the importance of secure random number generation.
Add to list
6
Lesons
23 minutes
On-Demand
Free-Video
USENIX Enigma Conference
The Evolving Architecture of the Web and Its Impact on Security, Privacy, and Latency
0
rewiews
Explore how changes in web architecture impact security, privacy, and latency. Examine evolving protocols and debate tradeoffs between complexity and user benefits.
Add to list
1
Lesons
16 minutes
On-Demand
Free-Video
MinutePhysics
How Quantum Computers Break Encryption - Shor's Algorithm Explained
0
rewiews
Explore Shor's Algorithm and its potential to break encryption using quantum computers. Learn about modular arithmetic, period-finding, and quantum Fourier transform in this informative video.
Add to list
1
Lesons
18 minutes
On-Demand
Free-Video
Bill Buchanan OBE
Advanced Cryptography - Tunnelling SSL/TLS/VPN
0
rewiews
Explore tunnelling modes, secure sockets, OpenSSL, Heartbleed vulnerability, VPNs, and key exchange methods in network security protocols like SSL/TLS.
Add to list
25
Lesons
55 minutes
On-Demand
Free-Video
Bill Buchanan OBE
Web Security and Encryption: From Browser Telemetry to Enterprise TLS - Guest Lecture
0
rewiews
Explore web security with expert Scott Helme, covering encryption, privacy, DNS, and content security policy. Gain insights on browser telemetry and enterprise TLS.
Add to list
15
Lesons
59 minutes
On-Demand
Free-Video
Linux Foundation
IoT TLS - Challenges and Solutions for Embedded Devices
0
rewiews
Exploring TLS challenges in IoT: memory constraints, networking stacks, and security implications. Insights on improving TLS support for embedded systems and the Zephyr project.
Add to list
19
Lesons
38 minutes
On-Demand
Free-Video
Linux Foundation
OpenSSL Hardware Offload Enhancement for TLS Acceleration
0
rewiews
Exploring OpenSSL's asynchronous acceleration framework for enhanced TLS performance, including implementation in Nginx and VPP, and recent improvements for efficient kernel bypass communication.
Add to list
12
Lesons
37 minutes
On-Demand
Free-Video
Linux Foundation
Linux Encryption Performance Improvements and Best Practices
0
rewiews
Explore recent Linux cryptographic stack improvements, covering TLS, dm-crypt, and hardware acceleration. Learn how enhanced encryption performance can bolster data protection across various architectures.
Add to list
14
Lesons
41 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Bridging the Gap - Gradual Istio Implementation for Your Platform
0
rewiews
Learn strategies for gradually implementing Istio service mesh, minimizing disruption and enabling smooth adoption across your organization. Gain insights from real-world experiences and practical steps.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
USENIX
Just the Cryptography You Need to Know for TLS
0
rewiews
Explore essential cryptographic concepts behind TLS, including asymmetric and symmetric keys, keystores, truststores, and mutual TLS, explained with accessible analogies.
Add to list
1
Lesons
14 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Hacking Istio: The Good, the Bad, and the Misconfigured
0
rewiews
Explore Istio's network security tools, learn to identify and exploit vulnerabilities in misconfigurations, and understand the importance of proper security policy setup in service mesh environments.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
Linux Foundation
Enabling Real-Time Secure Connectivity to the Industrial Edge with Single-Pair Ethernet and Zephyr
0
rewiews
Explore Single-Pair Ethernet and Zephyr OS for secure, real-time connectivity in industrial IoT. Learn how this combination enables flexible, high-data-rate links and IP connectivity to field devices.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Next-Level Security: Implementing MTLS in Istio Multi-Cluster Environments Using SPIRE
0
rewiews
Explore implementing mutual TLS in Istio multi-cluster environments using SPIRE. Learn about security challenges, mTLS, Istio's features, and SPIRE integration for enhanced microservices security.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Istio and DNS - Secure Integration and Modern Challenges
0
rewiews
Explore Istio's complex relationship with DNS, focusing on security, interception, and integration options for modern DNS features in cloud-native environments.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
A Not-so-Scary Way to Add Istio to Your Platform, Step by Step
0
rewiews
Step-by-step guide to implementing Istio service mesh, from basic ingress control to advanced features like mutual TLS and policy-driven authentication, with practical insights for a smooth adoption process.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
JVM and TLS - eBPF's Out-of-Comfort Zone
0
rewiews
Explore eBPF's application in observability, focusing on capturing encrypted TLS traffic in JVM apps. Learn about limitations, alternative strategies, and a Datadog PoC for overcoming challenges in cloud native observability.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
DevConf
Are Our Systems Using Up-to-Date Cryptography - DevConf.CZ 2023
0
rewiews
Explore system-wide cryptography monitoring: architecture, logging, and integration for up-to-date security and real-time diagnostics.
Add to list
15
Lesons
25 minutes
On-Demand
Free-Video
DevConf
Cybersecurity in the Post-Quantum Era - Challenges and Solutions
0
rewiews
Explore quantum computing's impact on cybersecurity, post-quantum cryptography, and future-proof protocols for secure communication in the digital age.
Add to list
26
Lesons
32 minutes
On-Demand
Free-Video
Devoxx Poland
Why is it Always DNS, TLS, and Bad Configs?
0
rewiews
Explore common IT issues: DNS, TLS, and configuration problems. Learn troubleshooting techniques and best practices for resolving these persistent challenges in software development.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
John Savill's Technical Training
How Encryption Works - A Comprehensive Guide from Basics to Advanced Techniques
0
rewiews
Explore encryption fundamentals, from symmetric and asymmetric methods to TLS handshakes, Diffie-Hellman exchanges, and AES. Gain insights into secure communication protocols and advanced encryption techniques.
Add to list
48
Lesons
2 hours 38 minutes
On-Demand
Free-Video
nullcon
Badkeys - Finding Weak Cryptographic Keys At Scale
0
rewiews
Discover how to detect weak cryptographic keys at scale using the badkeys tool and service. Learn about past vulnerabilities and new findings in TLS certificates and IoT devices.
Add to list
1
Lesons
39 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Criptografía Post-Cuántica Integrada en HTTPS
0
rewiews
Explora la integración de criptografía post-cuántica en HTTPS, abordando conceptos teóricos, algoritmos candidatos, proyectos de código abierto y resultados de pruebas de concepto para intercambio de claves y autenticación.
Add to list
1
Lesons
40 minutes
On-Demand
Free-Video
media.ccc.de
Sneaking in Network Security
0
rewiews
Leveraging service discovery for transparent network segmentation using mutual TLS, enhancing security without disrupting development or requiring downtime. Lessons from implementing strong access controls at scale.
Add to list
1
Lesons
1 hour 1 minute
On-Demand
Free-Video
USENIX Enigma Conference
Usable Security - The Source Awakens
0
rewiews
Exploring usable security research beyond end-users, focusing on system administrators and developers. Uses TLS to illustrate security issues across all levels and actors in information systems.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
BruCON Security Conference
Secure Channels - Building Real World Crypto Systems
0
rewiews
Explore secure channel cryptography, including key establishment, data protection, and essential properties. Learn about famous security bugs and recent improvements in SSH and TLS implementations.
Add to list
1
Lesons
1 hour 2 minutes
On-Demand
Free-Video
Red Hat
What's New in Security for Red Hat OpenStack Platform
0
rewiews
Explore recent security advancements in Red Hat OpenStack Platform, including key management, encryption, compliance, and future developments for enhanced cloud infrastructure protection.
Add to list
9
Lesons
38 minutes
On-Demand
Free-Video
NorthSec
Stay Quantum Safe - Future-Proofing Encrypted Secrets
0
rewiews
Explore quantum-safe cryptography's progress, standardization, and implementation in TLS, SSH, and VPN. Learn to future-proof encrypted data against potential quantum computer decryption.
Add to list
19
Lesons
36 minutes
On-Demand
Free-Video
Oracle
Exploring the Latest Open-Source Python API for Oracle Database Applications
0
rewiews
Discover Oracle's latest Python module for database applications, featuring a "thin" mode for easier configuration and efficient runtime, plus best practices for installation and upgrading.
Add to list
9
Lesons
32 minutes
On-Demand
Free-Video
media.ccc.de
Cryptography Demystified
0
rewiews
Einführung in die Grundlagen der Kryptographie ohne mathematische Vorkenntnisse. Erklärt Verschlüsselung, Authentifizierung, Zertifikate und sichere Verbindungen für ein breites Publikum.
Add to list
10
Lesons
53 minutes
On-Demand
Free-Video
USENIX Enigma Conference
Adventures in Authentication and Authorization
0
rewiews
Explore Netflix's journey in implementing authentication and authorization for microservices, discussing technology choices, challenges, and innovative solutions for a robust zero-trust ecosystem.
Add to list
11
Lesons
21 minutes
On-Demand
Free-Video
media.ccc.de
Enter the Matrix - Install Your Own Matrix Server on Arch Linux - Arch Conf 2020
0
rewiews
Learn to install and configure your own Matrix server on Arch Linux, joining a federated network for secure, decentralized real-time communication. Explore Synapse setup, ecosystem, and key features.
Add to list
18
Lesons
47 minutes
On-Demand
Free-Video
USENIX Enigma Conference
Inside "MOAR TLS" - How We Think about Encouraging External - Emily Schechter - USENIX Enigma Conference - 2017
0
rewiews
Exploring Google's "MOAR TLS" project to promote HTTPS adoption, addressing challenges, sharing strategies, and discussing the future of web security.
Add to list
7
Lesons
22 minutes
On-Demand
Free-Video
USENIX Enigma Conference
PKI at Scale Using Short-Lived Certificates - USENIX Enigma 2016
0
rewiews
Explore PKI deployment challenges at scale, focusing on short-lived certificates for cloud microservices. Learn about operational hurdles, scaling certificate authorities, and maintaining instance trustworthiness.
Add to list
13
Lesons
21 minutes
On-Demand
Free-Video
LASCON
Micro-services Challenges - Istio to the Rescue
0
rewiews
Explore Istio's solutions for micro-services challenges, including traffic management, policy enforcement, and security, to enhance scalability and operational efficiency.
Add to list
9
Lesons
44 minutes
On-Demand
Free-Video
LASCON
New Age Cloud Security - How to Build Secure Multi-Cloud Applications and Still Sleep Well
0
rewiews
Learn to build secure multi-cloud applications with modern techniques. Explore industry trends, development phases, and essential components like TLS, DNS, user management, and data encryption for robust cloud security.
Add to list
22
Lesons
59 minutes
On-Demand
Free-Video
OWASP Foundation
Preventing Mobile App and API Abuse
0
rewiews
Explore mobile app and API security threats, countermeasures, and defense-in-depth techniques through a courier service's evolving security approach against malicious attacks.
Add to list
32
Lesons
53 minutes
On-Demand
Free-Video
OWASP Foundation
A Tour of API Underprotection
0
rewiews
Explore API security threats, protection techniques, and advanced strategies. Learn about OAuth2, static API keys, mobile security, certificate pinning, and emerging technologies to strengthen your API security posture.
Add to list
26
Lesons
50 minutes
On-Demand
Free-Video
Association for Computing Machinery (ACM)
On the Practical - In-Security of 64-bit Block Ciphers - Collision Attacks on HTTP over TLS and OpenVPN
0
rewiews
Explore practical security vulnerabilities in 64-bit block ciphers, focusing on collision attacks in HTTP over TLS and OpenVPN. Learn about countermeasures and implications for network security.
Add to list
15
Lesons
31 minutes
On-Demand
Free-Video
Microsoft
Ask the Experts - Azure Networking
0
rewiews
Interact with Azure Networking experts to learn about latest announcements, ask questions, and provide feedback on topics like load balancing, routing, and connectivity options.
Add to list
21
Lesons
30 minutes
On-Demand
Free-Video
Docker
Securing Your Containerized Applications with NGINX
0
rewiews
Explore NGINX's role in securing containerized apps as a sidecar reverse proxy, covering TLS, HTTP, authentication, authorization, and traffic control.
Add to list
10
Lesons
23 minutes
On-Demand
Free-Video
NDC Conferences
OAuth 2.1 and Beyond
0
rewiews
Explore modern OAuth techniques for enhanced security, including strong client authentication, proof-of-possession tokens, and hardened authorization requests.
Add to list
33
Lesons
58 minutes
On-Demand
Free-Video
IEEE
An Extensive Formal Security Analysis of the OpenID Financial Grade API
0
rewiews
Comprehensive formal security analysis of OpenID Financial-grade API, uncovering vulnerabilities and proposing mitigations for this high-stakes OAuth 2.0 profile designed for Open Banking scenarios.
Add to list
13
Lesons
17 minutes
On-Demand
Free-Video
USENIX
Achieving Mutual TLS - Secure Pod-to-Pod Communication Without the Hassle
0
rewiews
Explore secure pod-to-pod communication using Mutual TLS, focusing on certificate management, implementation in Golang and Java applications, and integration with Kubernetes for streamlined security.
Add to list
19
Lesons
32 minutes
On-Demand
Free-Video
load more...