
Essential Cybersecurity For Devops, Cloud And Devs
Published 6/2025
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Language: English | Duration: 21h 56m | Size: 11.4 GB
Symmetric & Asymmetric Encryption, OpenSSL, Digital Signature, TLS, Auth, SAML,OIDC,Protection Rings,Malwares & Attack
What you'll learn
Fundamental Security Principles - Cryptography and Protection Rings of the CPU.
Cryptographic Techniques: Hashing algorithms, symmetric and asymmetric encryption, digital signatures, and Diffie-Hellman Key Exchange.
Secure Communication Protocols: Transport Layer Security (TLS), the role of Certificate Authorities (CA), SNI, and Proxies.
Identity & Access Management: authentication, authorization, SAML, OIDC, and OAuth.
System-Level Security - CPU protection rings, kernel vs. user mode, and privilege escalation.
Real-World Vulnerabilities - Investigate exploits like Heartbleed, Spectre/Meltdown, and Log4Shell.
Malware Analysis - Examine infamous cases (Stuxnet, WannaCry, ILOVEYOU worm).
Cyberattack Techniques - Recognize phishing, SQLi, DDoS, DNS spoofing, XSS, and botnets.
Defensive Strategies - Implement safeguards for personal/corporate systems against modern threats.
Requirements
Basic knowledge in computer science
Description
In today's interconnected world, cybersecurity is paramount as digital threats constantly evolve, jeopardizing sensitive data, critical infrastructure, and global economies. Our comprehensive course will equip you with a foundational understanding of various essential security principles, attack vectors and defensive strategies.In chapter 1 we will be discussing about Cryptography, one of the two pillars of security. We will be discussing in detailed about the following topics.Security LandscapeTwo Pillars of security - Cryptography and Protection Rings of CPUHashing AlgorithmOpenSSLSymmetric EncryptionAsymmetric EncryptionDigital SignaturesDiffie-Hellman Key ExchangeTransport Layer Security (TLS)Certificate Authority (CA)SNIProxyCode SigningAuthenticationAuthorizationSAML, OIDC & OAuthIn chapter 2 we will be dealing with second pillar of security, Protection Rings of CPU. We will be discussing in detailed about
Who this course is for
Security Professionals, Cloud Administrators, DevOps Engineers, IT Professionals, SecOps Engineers
Code:
Bitte
Anmelden
oder
Registrieren
um Code Inhalt zu sehen!