Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#VPN
YouTube
education
#WireGuard
Showing:
106
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Awesome Open Source
Understanding the Need for Domains and DNS in Business
2
rewiews
Explore the importance of domain names and DNS for businesses, covering professional branding, email setup, and application hosting. Learn about DNS management, VPNs, and overcoming ISP limitations.
Add to list
11
Lesons
28 minutes
On-Demand
Free-Video
The Complete Kali Linux Course - Beginner to Advanced
1
rewiews
Comprehensive guide to ethical hacking using Kali Linux, covering installation, network security, WiFi cracking, social engineering, and advanced exploitation techniques with hands-on demonstrations.
Add to list
72
Lesons
16 hours
On-Demand
Free-Video
Software Engineering Courses - SE Courses
Enable VPN for a Single App Using Cloudflare Zero Trust Free Warp VPN - Split Tunneling
0
rewiews
Configure Cloudflare Warp VPN for specific apps using Zero Trust's split tunneling. Learn installation, setup, and security measures for targeted VPN usage on Windows.
Add to list
18
Lesons
13 minutes
On-Demand
Free-Video
Hussein Nasser
Network Engineering
0
rewiews
Comprehensive exploration of network engineering concepts, protocols, and technologies, covering OSI model, TCP/UDP, NAT, security, load balancing, and more through practical examples and real-world applications.
Add to list
51
Lesons
17 hours
On-Demand
Free-Video
Hussein Nasser
Proxies
0
rewiews
Comprehensive exploration of proxy types, load balancing, and high availability, covering key technologies like HAProxy, Nginx, and Envoy for robust system architecture and performance.
Add to list
27
Lesons
14 hours
On-Demand
Free-Video
Joseph Delgadillo
Hacking Course - Go from Beginner to Advanced
0
rewiews
Aprende hacking ético desde cero hasta avanzado, incluyendo instalación de Fedora, uso de Wireshark, proxies, VPN, TOR, aircrack-ng, HashCat, y más. Accede a tutores y subtítulos en inglés y español.
Add to list
13
Lesons
2 hours 8 minutes
On-Demand
Free-Video
Kali Linux
0
rewiews
Comprehensive guide to Kali Linux, covering installation, tools, security techniques, and system optimization for ethical hacking and penetration testing.
Add to list
22
Lesons
3 hours 30 minutes
On-Demand
Free-Video
vBrownBag
VMware NSX Edge Gateway & Distributed Firewall with Tim Davis
0
rewiews
Comprehensive overview of VMware NSX Edge Gateway and Distributed Firewall, covering key features, deployment strategies, and design principles for network virtualization and security.
Add to list
17
Lesons
1 hour 10 minutes
On-Demand
Free-Video
Hussein Nasser
VPN vs Proxy Explained - Pros and Cons
0
rewiews
Comprehensive comparison of VPNs and proxies, exploring their functionalities, advantages, and limitations for network security and privacy. Includes technical details and practical applications.
Add to list
11
Lesons
36 minutes
On-Demand
Free-Video
Hussein Nasser
TCP Tunneling Applications - Pros and Cons Explained by Example
0
rewiews
Explore TCP tunneling, its applications, and pros/cons. Learn about VPNs, securing connections, bypassing firewalls, and achieving anonymity through practical examples and explanations.
Add to list
9
Lesons
30 minutes
On-Demand
Free-Video
Chris Titus Tech
Methods to Setup and Use a VPN
0
rewiews
Comprehensive guide on setting up VPNs using various methods, including Synology, QNAP, Windows client, and pfSense. Covers installation, configuration, and troubleshooting for secure remote access.
Add to list
6
Lesons
24 minutes
On-Demand
Free-Video
Chris Titus Tech
Protect Yourself Online - 5 Pillars of Security and Privacy
0
rewiews
Comprehensive guide to online security covering operating systems, DNS servers, web browsers, VPNs, and social media. Learn practical steps to enhance your digital privacy and protect yourself online.
Add to list
8
Lesons
25 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Zero Trust Network Turnkey Solution for Service Mesh - Architecture and Implementation
0
rewiews
零信任网络整体解决方案:高性能可扩展的安全网关和负载均衡器,支持K8s入口/出口网关和边缘云网关,实现零信任服务网格,利用VPP、DPDK和SGX等技术提升性能和安全性。
Add to list
12
Lesons
32 minutes
On-Demand
Free-Video
UbuCon Asia
Configuring Private Cloud with Ubuntu in Server Room
0
rewiews
서버실에서 Ubuntu를 사용한 프라이빗 클라우드 구성 방법을 학습하고 MAAS와 Azure를 연결하여 하이브리드 클라우드를 구축하는 실습을 진행합니다.
Add to list
1
Lesons
1 hour 36 minutes
On-Demand
Free-Video
Bill Buchanan OBE
Introduction to Security and Network Forensics - Network Security Elements
0
rewiews
Comprehensive overview of network security elements, covering firewalls, NAT, VPNs, and IPSec. Ideal for those seeking to understand fundamental security concepts and technologies.
Add to list
15
Lesons
1 hour 7 minutes
On-Demand
Free-Video
Bill Buchanan OBE
BBC Scotland Brainwaves: Cyber Security Overview - January 19, 2015
0
rewiews
Explore cyber security essentials: stalking, passwords, identity theft, VPNs, authentication, and industry trends. Gain insights into protecting yourself in the digital age.
Add to list
16
Lesons
28 minutes
On-Demand
Free-Video
Hussein Nasser
How Public WIFI Can Be Sniffed
0
rewiews
Explore public WiFi vulnerabilities, packet sniffing techniques, and man-in-the-middle attacks. Learn about IP addressing, NAT, and the OSI model to understand network security risks and protection methods.
Add to list
5
Lesons
23 minutes
On-Demand
Free-Video
Hussein Nasser
The Beauty of the Internet Protocol
0
rewiews
Explore the elegance of the Internet Protocol, its role in routing, addressing, and enabling VPNs. Learn about IP addresses, network routing, and the protocol's impact on modern communication.
Add to list
11
Lesons
26 minutes
On-Demand
Free-Video
Linux Foundation
Low Trust Edge Network - Performance and Security with Calico, VPP, and WireGuard
0
rewiews
Explore optimizing edge network performance and security using Calico, VPP, and WireGuard. Learn strategies for resource constraints and data path optimization in low-trust environments.
Add to list
13
Lesons
22 minutes
On-Demand
Free-Video
media.ccc.de
TrustMeRelay - Investigating Apple's iCloud Private Relay
0
rewiews
Reverse engineering and analysis of Apple's iCloud Private Relay, examining its dual-hop architecture, protocols, and privacy claims. Insights into the service's implementation, potential vulnerabilities, and effectiveness in protecting user privacy.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
Linux Foundation
Opportunistic Encryption Using IPsec - Implementation and Configuration
0
rewiews
Explore opportunistic encryption with IPsec, leveraging XFRM code for automatic traffic encryption. Learn configuration techniques for cloud deployments and internet-wide implementation using X.509 certificates and LetsEncrypt.
Add to list
18
Lesons
54 minutes
On-Demand
Free-Video
HashiCorp
Zero Trust Security with Boundary and Vault
0
rewiews
Explore zero trust security implementation using HashiCorp Boundary and Vault for secure, scalable access to cloud resources without VPNs or static credentials.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
Dev Odyssey
Setting Up OpenVPN on a Router for Home Network Tunneling
0
rewiews
Learn to set up a network-wide VPN using OpenVPN and OpenWrt. Explore advantages over WireGuard, installation steps, and configuration tips for secure home networking.
Add to list
7
Lesons
18 minutes
On-Demand
Free-Video
Awesome Open Source
Netbird - Open Source Self-Hosted Wireguard VPN System Setup and Configuration
0
rewiews
Learn to set up Netbird, an open-source Wireguard VPN system, with server GUI and easy client setup. Covers installation, configuration, and user management for secure, self-hosted networking.
Add to list
12
Lesons
39 minutes
On-Demand
Free-Video
Paul Browning
Advanced Network Security Concepts
0
rewiews
Comprehensive exploration of advanced network security, covering VPNs, PKI, cloud threats, SDN, and automation. Prepares for various cybersecurity certifications with practical examples and hands-on training.
Add to list
17
Lesons
3 hours 3 minutes
On-Demand
Free-Video
Black Hat
Chinese APT - Exploiting Edge Devices for Surveillance and Attacks
0
rewiews
Revelación de ataques de APT chinos a dispositivos de borde, incluyendo un 0-day en routers de vigilancia. Se analizan casos de estudio y se proponen estrategias de mitigación.
Add to list
1
Lesons
32 minutes
On-Demand
Free-Video
Bugcrowd
How to Build a Secure Recon Network Using Tailscale
0
rewiews
Build a secure recon network with Tailscale to protect your offensive tools, safeguard data, and enhance your bounty hunting capabilities.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
Linux Foundation
Remote Access to IoT Devices: Common Needs and Approaches
0
rewiews
Explore common needs and approaches for remote access to IoT devices, including risks, audit logs, customer requests, and role-based access control. Learn about various connection methods and off-the-shelf solutions.
Add to list
21
Lesons
33 minutes
On-Demand
Free-Video
NDC Conferences
Connecting Remotely Like a Pro
0
rewiews
Discover practical tricks for remote connectivity, including multi-VPN usage, maintaining connections during network issues, and accessing VNC at the CPU level. Live demos showcase innovative solutions.
Add to list
1
Lesons
1 hour 3 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
ZeroTrust Microservices with WebAssembly and WireGuard
0
rewiews
Explore zero-trust architectures for cloud computing using WebAssembly and WireGuard. Learn to implement end-to-end encryption and role-based access controls in microservices for enhanced security.
Add to list
1
Lesons
34 minutes
On-Demand
Free-Video
Pragmatic AI Labs
Connecting Networks for AWS Solutions Architect - Episode 15
0
rewiews
Explore AWS network connectivity options: VPNs, Direct Connect, VPC peering, and Transit Gateway. Learn to scale and connect VPCs for efficient cloud architecture.
Add to list
8
Lesons
26 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Full Mesh Encryption in Kubernetes with WireGuard and Calico
0
rewiews
Explore full mesh encryption in Kubernetes using WireGuard and Calico. Learn implementation details, benefits, and how to achieve data-in-transit security for compliance and zero-trust models.
Add to list
15
Lesons
35 minutes
On-Demand
Free-Video
Awesome Open Source
Pritunl - A Free, Self-Hosted, Open Source VPN Tunnel with a Simple Web UI and Cross-Platform Clients
0
rewiews
Explore Pritunl: A free, self-hosted VPN solution with user-friendly interface, multi-tenant capabilities, and cross-platform support for secure, customizable network access.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
Awesome Open Source
Subspace - A GUI Front End for the Wireguard VPN Server
0
rewiews
Learn to install and configure Subspace, a free open-source GUI for Wireguard VPN servers. Covers manual setup on Ubuntu with Docker and includes an automated installation script option.
Add to list
1
Lesons
37 minutes
On-Demand
Free-Video
Awesome Open Source
Create a Reverse Proxy for Self-Hosted Services Using Netmaker and Wireguard
0
rewiews
Learn to set up a reverse proxy using Netmaker and Wireguard for secure, remote access to self-hosted services. Covers installation, configuration, and practical implementation.
Add to list
14
Lesons
15 minutes
On-Demand
Free-Video
Awesome Open Source
Netmaker - A Powerful, Open Source, Self Hosted, GUI for Setting Up Wireguard Networks and VPNs
0
rewiews
Learn to set up and manage Wireguard networks and VPNs using Netmaker, an open-source tool with a user-friendly GUI. Explore installation, client setup, network configurations, and advanced features.
Add to list
11
Lesons
41 minutes
On-Demand
Free-Video
Awesome Open Source
Self-Hosted Gateway - WireGuard Tunnel for Secure External Access to All of Your Self Hosted Apps
0
rewiews
Learn to set up a WireGuard tunnel for secure external access to self-hosted apps, including server and client installation, Docker-Compose configuration, and app deployment.
Add to list
7
Lesons
26 minutes
On-Demand
Free-Video
Awesome Open Source
Mistborn - Open Source WireGuard Server GUI with Pi-Hole and Cockpit
0
rewiews
Explore Mistborn: A self-hosted WireGuard server GUI with integrated pi-hole and cockpit. Learn installation, configuration, and usage of this open-source solution for enhanced online security and privacy.
Add to list
7
Lesons
24 minutes
On-Demand
Free-Video
Awesome Open Source
Pritunl VPN with WireGuard - Open Source, Self Hosted, and Fast
0
rewiews
Learn to set up and use Pritunl VPN with WireGuard support, exploring its open-source features, server-side GUI, and desktop client. Compare speeds with other VPN options and discover self-hosting benefits.
Add to list
11
Lesons
34 minutes
On-Demand
Free-Video
Awesome Open Source
Wireguard - A Free, Open Source, Self Hosted, Cross Platform VPN Tunnel Built With Speed & Security
0
rewiews
Learn to set up Wireguard VPN tunnel on servers, clients, and iOS devices for secure, fast, cross-platform connectivity using this step-by-step tutorial.
Add to list
7
Lesons
43 minutes
On-Demand
Free-Video
Bill Buchanan OBE
Advanced Cryptography - Tunnelling SSL/TLS/VPN
0
rewiews
Explore tunnelling modes, secure sockets, OpenSSL, Heartbleed vulnerability, VPNs, and key exchange methods in network security protocols like SSL/TLS.
Add to list
25
Lesons
55 minutes
On-Demand
Free-Video
Hussein Nasser
How Tor Works - The Onion Router
0
rewiews
Explore Tor's anonymous communication technology, its advantages over VPNs, and how it protects user privacy through onion routing in this comprehensive overview.
Add to list
6
Lesons
24 minutes
On-Demand
Free-Video
SecurityFWD
Exploring Hacker Operating Systems - Whonix
0
rewiews
Explore Whonix, a privacy-focused OS, with experts. Learn installation, IP protection, Tor routing, potential vulnerabilities, and comparisons to other secure systems in this comprehensive overview.
Add to list
20
Lesons
45 minutes
On-Demand
Free-Video
The Aspen Institute
When the Web Goes Dark - State Control and Internet Shutdowns
0
rewiews
Explore global internet censorship, its impact on human rights, and strategies to combat state-controlled shutdowns in this expert panel discussion on digital freedom.
Add to list
17
Lesons
59 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
From Eventual to Strict Encryption - Securing Cilium's WireGuard Encryption
0
rewiews
Explore Cilium's WireGuard strict mode, enhancing Pod-to-Pod traffic encryption in Kubernetes clusters. Learn about identity-based routing and how to mitigate unencrypted data transmission risks.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Crossing the Boundary - Hybrid Kubernetes Clusters with Wireguard
0
rewiews
Explore hybrid Kubernetes clusters using Wireguard for secure, efficient cross-boundary communication in cloud-native environments.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
Docker
Introducing LinuxKit: Container OS and Security Features
0
rewiews
Explore LinuxKit, a toolkit for building secure, portable, and lean operating systems for containers, covering its features, applications, and security aspects.
Add to list
18
Lesons
42 minutes
On-Demand
Free-Video
Docker
WireGuard Deep Dive - LinuxKit Security SIG
0
rewiews
Explore WireGuard's cryptography, network namespace usage, and advantages over other VPNs in this comprehensive technical session with a live demonstration.
Add to list
1
Lesons
1 hour
On-Demand
Free-Video
Awesome Open Source
Headscale: Open Source Self-Hosted Wireguard Control Server for Tailscale Networks
0
rewiews
Learn to set up and manage Headscale, an open-source Wireguard control server for Tailscale networks. Covers server configuration, reverse proxy setup, user management, and web UI installation.
Add to list
10
Lesons
48 minutes
On-Demand
Free-Video
Linux Foundation
Securing Data-in-Transit with Wireguard for Kubernetes Clusters
0
rewiews
Enhance Kubernetes cluster security by implementing WireGuard and Calico for encrypted inter-node traffic. Learn to mitigate risks, overcome constraints, and ensure robust protection against data interception and malicious payloads.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Don't Trust the NIC - Attacking Windows NDIS Drivers
0
rewiews
Exploración de vulnerabilidades en controladores NDIS de Windows, demostrando ataques y problemas de seguridad en implementaciones de proveedores, incluyendo Microsoft.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
WEareTROOPERS
Remote Access and Business Partner Connections
0
rewiews
Explore secure remote access solutions and business partner connections, focusing on best practices, challenges, and innovative approaches for modern network security.
Add to list
1
Lesons
1 hour 17 minutes
On-Demand
Free-Video
Security BSides London
Probe to Pwn - Rookie Track
0
rewiews
Explore mobile and wireless attack methods, from target identification to device compromise, and learn mitigation strategies to protect against various threats and vulnerabilities.
Add to list
13
Lesons
13 minutes
On-Demand
Free-Video
Security BSides San Francisco
WireGuard from the Ground Up
0
rewiews
Comprehensive overview of WireGuard: its implementation, protocol, cryptography, and comparison with other VPN solutions. Learn when and how to use this efficient end-to-end encryption tool.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
BSidesLV
What Reaction to Packet Loss Reveals About VPN
0
rewiews
Explore VPN behavior under packet loss, analyzing timing patterns and network algorithms to understand security implications and potential vulnerabilities.
Add to list
19
Lesons
36 minutes
On-Demand
Free-Video
44CON Information Security Conference
Subgraph OS - Hardening a Linux Desktop
0
rewiews
Explore Subgraph OS: a hardened Linux desktop with advanced security features, including kernel protection, application sandboxing, and network safeguards.
Add to list
36
Lesons
55 minutes
On-Demand
Free-Video
NorthSec
Critical Vulnerabilities in Network Equipment - Past, Present, and Future
0
rewiews
Explore critical vulnerabilities in network equipment, from routers to firewalls. Learn about common patterns, historical context, and future trends in cybersecurity for these essential devices.
Add to list
15
Lesons
31 minutes
On-Demand
Free-Video
NorthSec
Stay Quantum Safe - Future-Proofing Encrypted Secrets
0
rewiews
Explore quantum-safe cryptography's progress, standardization, and implementation in TLS, SSH, and VPN. Learn to future-proof encrypted data against potential quantum computer decryption.
Add to list
19
Lesons
36 minutes
On-Demand
Free-Video
Oracle
Adding Resilience and Redundancy from On-Premises to Oracle Cloud Infrastructure
0
rewiews
Explore best practices for designing and implementing full end-to-end redundancy and resiliency between on-premises systems and OCI using FastConnect and VPN for single and multiregion scenarios.
Add to list
7
Lesons
27 minutes
On-Demand
Free-Video
WEareTROOPERS
Dynamic IPv6 Prefix Problems and VPNs
0
rewiews
Explore challenges and solutions for dynamic IPv6 prefix allocation in VPN environments, covering routing, policies, and potential fixes for enterprise networks.
Add to list
21
Lesons
43 minutes
On-Demand
Free-Video
Black Hat
APTs Go Teleworking - The Rise of VPN Exploits
0
rewiews
Explore the rise of VPN exploits amid increased remote work, focusing on Pulse Secure vulnerabilities, incident response challenges, and threat actor tactics in cyber espionage campaigns.
Add to list
17
Lesons
25 minutes
On-Demand
Free-Video
Black Hat
Compression Oracle Attacks on VPN Networks
0
rewiews
Explore compression oracle attacks on VPN networks, including browser requests and ESP compression. Learn detection methods, setup requirements, and potential future threats.
Add to list
20
Lesons
43 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
A Tale of Building a Real Full Speed Anti-Censorship Router
0
rewiews
Comprehensive guide to building a high-speed anti-censorship router, covering GFW history, bypass methods, protocols, deployment strategies, and practical implementation for unrestricted internet access.
Add to list
1
Lesons
54 minutes
On-Demand
Free-Video
BSidesLV
Improving Security by Avoiding Traffic and Still Get What You Want in Data Transfers
0
rewiews
Explore innovative data transfer techniques to enhance security without compromising connectivity. Learn about unidirectional gateways, database replication, and state transfer devices for improved network protection.
Add to list
24
Lesons
42 minutes
On-Demand
Free-Video
media.ccc.de
Wireguard – Einfache, robuste und sichere VPNs
0
rewiews
Einführung in WireGuard: Modernes P2P VPN-Protokoll mit Fokus auf Sicherheit, Performance und Mobilgeräte-Unterstützung. Erläuterung der Funktionsweise und praktische Anleitung zur Einrichtung eines eigenen WireGuard-VPNs.
Add to list
1
Lesons
34 minutes
On-Demand
Free-Video
Security BSides London
Is Privacy Still A Thing?
0
rewiews
Explore online tracking methods and countermeasures to protect your privacy in the digital age. Learn about government surveillance, mass tracking, and tools to stay off the radar.
Add to list
36
Lesons
14 minutes
On-Demand
Free-Video
Black Hat
WireGuard - Next Generation Secure Network Tunnel
0
rewiews
Explore WireGuard, a modern VPN protocol offering improved security, performance, and simplicity compared to traditional options like IPsec and OpenVPN. Learn about its innovative design and benefits.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
Black Hat
Virtually Private Networks
0
rewiews
Explore the security implications of remote access solutions and VPNs for enterprise mobile workforces, examining potential vulnerabilities and challenges.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
NDC Conferences
Connect Remotely Like a Pro - Hack VPNs, Avoid Firewalls, Connect Even When Your Machine Is Down
0
rewiews
Practical tricks for remote work: multiple VPNs, stable connections, and accessing dead laptops. Learn to overcome network challenges and enhance remote connectivity.
Add to list
1
Lesons
1 hour 3 minutes
On-Demand
Free-Video
Black Hat
VPN Architectures - Looking at the Complete Picture
0
rewiews
Comprehensive exploration of VPN architectures, addressing enterprise security concerns, integration with authorization systems, and deployment strategies for branch offices and remote users.
Add to list
25
Lesons
1 hour 3 minutes
On-Demand
Free-Video
Black Hat
Top 25 Overlooked Security Configurations on Your Switches and Routers
0
rewiews
Comprehensive guide to enhancing network security by addressing often-overlooked configurations on switches and routers, covering encryption, filtering, logging, and protocol-specific settings.
Add to list
31
Lesons
1 hour 5 minutes
On-Demand
Free-Video
Black Hat
Putting the P Back in VPN
0
rewiews
Explore innovative techniques for enhancing privacy in Virtual Private Networks, focusing on cutting-edge strategies to secure digital communications and protect user anonymity.
Add to list
1
Lesons
1 hour 9 minutes
On-Demand
Free-Video
Black Hat
Mobile Computing Security
0
rewiews
Explore mobile computing security challenges and solutions, covering topics like wireless networks, authentication, data theft prevention, and information security best practices.
Add to list
21
Lesons
1 hour 18 minutes
On-Demand
Free-Video
Cooper
Defeating VPN Always-On
0
rewiews
Explore techniques to bypass VPN Always-On security measures, uncovering potential vulnerabilities and network protection strategies.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
Hack3rcon II 1-4 Joshua Perry OSINT
0
rewiews
Explore OSINT techniques for competitive intelligence, covering tools and strategies to gather information on companies, networks, and individuals through various online sources.
Add to list
46
Lesons
1 hour 7 minutes
On-Demand
Free-Video
The Security Trust Chain is Broken - What We're Doing About It
0
rewiews
Explore the broken security trust chain, its impact on open-source projects, and ongoing efforts to address vulnerabilities in critical software infrastructure.
Add to list
16
Lesons
46 minutes
On-Demand
Free-Video
Tactical Diversion Driven Defense
0
rewiews
Explore tactical diversion-driven defense strategies, including deception warfare, honeypots, and social engineering techniques to enhance network security and thwart potential threats.
Add to list
30
Lesons
24 minutes
On-Demand
Free-Video
Decentralization for Security and Freedom - A Discussion of Asymmetric and Decentralized Approaches
0
rewiews
Explore decentralization's role in enhancing security and freedom, covering VPNs, autonomous tools, and innovative projects like IPFS and Magic Wormhole.
Add to list
21
Lesons
55 minutes
On-Demand
Free-Video
Using Technology to Defend Digital Privacy Human Rights
0
rewiews
Learn to protect digital privacy using technology. Explore threats, risk assessment, secure browsing, anonymous operating systems, VPNs, and secure messaging to safeguard your online presence and human rights.
Add to list
27
Lesons
58 minutes
On-Demand
Free-Video
linux.conf.au
Privacy and Transparency in VPN Industry
0
rewiews
Explore transparency in VPN industry, discussing privacy issues, data collection, and an open-source solution for enhanced security and trust in VPN services.
Add to list
11
Lesons
31 minutes
On-Demand
Free-Video
Linux Plumbers Conference
WireGuard - Next-Generation Secure Kernel Network Tunnel
0
rewiews
Explore WireGuard, a new Linux network tunneling mechanism with formal cryptographic protocol, small codebase, and widespread deployment. Learn about its kernel integration, performance, and ecosystem impact.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
Linux Foundation
Zero Trust Cloud VPN Based on VPP and WireGuard
0
rewiews
Explore a Zero Trust Cloud VPN solution using VPP and WireGuard, addressing industry challenges and showcasing innovative architecture for enhanced security and performance.
Add to list
13
Lesons
46 minutes
On-Demand
Free-Video
Dev Odyssey
Split Tunneling Your VPN Traffic with Policy Based Routing - OpenWrt, Wireguard, OpenVPN
0
rewiews
Optimize VPN usage with split tunneling and policy-based routing on OpenWrt. Learn to selectively route traffic, enhance convenience, and maintain security across multiple VPNs and devices.
Add to list
10
Lesons
18 minutes
On-Demand
Free-Video
DPDK Project
Bytebricks - A Generic High Performance VPN Framework
0
rewiews
Discover how to build high-performance VPN frameworks using DPDK's graph library, focusing on multi-core scalability and protocol flexibility through the Bytebricks implementation example.
Add to list
15
Lesons
14 minutes
On-Demand
Free-Video
DPDK Project
Challenges Faced When Building Various DPDK-based Applications
0
rewiews
Explore real-world challenges and solutions in migrating Linux networking applications to DPDK, focusing on performance optimization and practical implementation strategies.
Add to list
16
Lesons
26 minutes
On-Demand
Free-Video
Tech Field Day
Zero Trust Security Strategy - Beyond Products and Implementation
0
rewiews
Discover how Zero Trust transcends beyond products like ZTNA to become a comprehensive security framework based on "never trust, always verify" principles for modern network protection.
Add to list
1
Lesons
12 minutes
On-Demand
Free-Video
Tech Field Day
Anuta ATOM - Network Service Orchestration and Automation
0
rewiews
Discover how Anuta ATOM enables end-to-end network automation, from service orchestration to assurance, featuring deployment flexibility and support for 5G, L2/L3 VPN, and high-performance research networks.
Add to list
11
Lesons
20 minutes
On-Demand
Free-Video
Open Compute Project
SONiC SRv6 VPN Deployment for Predictable WAN
0
rewiews
Discover how SRv6 VPN enables intelligent network access and scalable dataplane solutions through white-box and SONiC technologies for building predictable WANs.
Add to list
1
Lesons
18 minutes
On-Demand
Free-Video
DEFCONConference
Solving the Lover Stalker Killer Murder Case Using Digital Forensics Tools
0
rewiews
Delve into forensic digital investigation techniques used to solve a real murder case, exploring how basic Unix tools and Perl programming helped crack a complex cyberstalking homicide investigation.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
ACM SIGPLAN
Computational-Bounded Robust Compilation and Universally Composable Security
0
rewiews
Explore computational-bounded robust compilation and its connection to universally composable security. Extend techniques to computational UC security and generalize beyond to arbitrary equalities.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
Van Tech Corner
NanoPi R6S - Wireguard and OpenVPN Throughput Test
0
rewiews
Explore NanoPi R6S VPN performance with Wireguard and OpenVPN. Learn installation, configuration, and throughput testing using OpenSpeedTest and iperf3 on FriendlyWrt (OpenWrt 22.03.2).
Add to list
13
Lesons
22 minutes
On-Demand
Free-Video
Awesome Open Source
Netbird Update - Adding the New Relays Feature
0
rewiews
Learn to add the new "Relays" feature to your Netbird installation, enhancing network connectivity and performance. This update guide covers upgrading, configuration changes, and container management.
Add to list
10
Lesons
19 minutes
On-Demand
Free-Video
Paul Browning
Cloud Concepts and Connectivity for Network+ - Lesson 3
0
rewiews
Explore cloud networking concepts, benefits, deployment options, and security for CompTIA Network+ exam preparation. Covers VPCs, gateways, connectivity, and service models.
Add to list
15
Lesons
19 minutes
On-Demand
Free-Video
GOTO Conferences
Modding Security & Privacy
0
rewiews
Explore the intersection of modding, security, and privacy in technology, covering topics like router modifications, GPL violations, and the implications of altering devices for unintended purposes.
Add to list
15
Lesons
41 minutes
On-Demand
Free-Video
Paul Browning
Cisco CCNA Cram - Part 2 - ICND2
0
rewiews
Comprehensive CCNA preparation covering advanced networking topics like STP, OSPF, EIGRP, VPNs, and IPv6. Includes practical configurations and troubleshooting techniques for Cisco network devices.
Add to list
33
Lesons
49 minutes
On-Demand
Free-Video
Tech Field Day
Nonstop Edge Networking and Security for Distributed Enterprises
0
rewiews
Discover how Mako Networks delivers secure edge networking and SD-WAN solutions for distributed enterprises, featuring patented technology and managed services for seamless business operations.
Add to list
9
Lesons
38 minutes
On-Demand
Free-Video
DEFCONConference
Civil Cyber Defense - Protecting Vulnerable Organizations Against Advanced Threats
0
rewiews
Discover how civil cyber defenders protect vulnerable organizations, journalists, and activists using OSINT skills and open-source tools while combating human trafficking and surveillance threats.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
DEFCONConference
Defeating VPN Always-On: Security Control Analysis and Bypass Methods
0
rewiews
Discover security vulnerabilities in VPN Always-On implementations, exploring bypass techniques and hardening strategies for better network protection and data leak prevention.
Add to list
1
Lesons
40 minutes
On-Demand
Free-Video
DevOops
Security для бедных без ущерба для DevEx
0
rewiews
Discover practical approaches to implementing cost-effective security measures in remote-first companies while maintaining developer experience, from VPN alternatives to legacy system management.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
Linux Plumbers Conference
WireGuard and Generic Receive Offload (GRO) Integration - Networking Performance Optimization
0
rewiews
Explore WireGuard's integration with Generic Receive Offload (GRO) for enhanced network performance and efficiency in Linux systems.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
load more...