Cybersecurity | Cloud | DevelopmentPrivacy and identity management securing Learning Analytics on the Blockchain January 29, 2020 video conferenceecosystemsGRIALinternational conferencemulticulturalitypaperspresentationsresearchersSalamancascientific conferenceSpainTechnologyTechonological Ecosystems for Enhancing Multiculturalityteem18teemconferenceUniversidad de SalamancaUSALVIIICentenario
Cybersecurity | Cloud | Development13 – JDeveloper and OIMclient API installation – OIM 11.1.2.3 January 29, 2020 video Access ManagerConnectorDatabaseDBATDesign ConsoleIAMIdentity ManagementIDMJavaJDeveloperMike BitarOAMOIMOracleOracle Identity ManagementSQLWebLogic
Cybersecurity | Cloud | DevelopmentAuth0: Zero Friction Identity Management January 29, 2020 video camera phonefreesharinguploadvideovideo phone
Cybersecurity | Cloud | DevelopmentWhat is ethical hacking? January 28, 2020 video cyber attackcyber securityECBECB European Central Bankethical hackingfriendly hackerhackerWhat if it gets hacked
Cybersecurity | Cloud | DevelopmentComplete Kali Linux Tutorial For Ethical Hacking Information Gathering With Kali Linux January 28, 2020 video Complete Kali Linux Tutorial For Ethical Hacking Information Gathering With Kali Linuxhackingkali linuxShadow Stream
Cybersecurity | Cloud | DevelopmentEthical Hacking Tutorial | APT17 January 28, 2020 video APT17become a hackerethical hackingethical hacking hindiethical hacking steps in hindiethical hacking tools in hindiethical hacking tutorialethical hacking tutorial for beginners in hindiethical hacking tutorial in hindiethical hacking tutorial online in hindihackerhackinghacking tutorialshow to be a hackerhow to be hackerhow to becomehow to become a ethical hackerhow to hacklearn hackinglearn how to hacklearn to hackonline hack
Cybersecurity | Cloud | DevelopmentLonne Jaffe, Syncsort | AWS Re:Invent 2013 January 28, 2020 video AWS Re:Invent 2013 2013Dave VellanteJeff KellyJohn FurrierLonne JaffeSiliconANGLEStu MinimanSyncsortWikibon
Cybersecurity | Cloud | DevelopmentHashicorp Consul – How to install Consul and store AWS access, secret keys for Terraform January 28, 2020 video Access KeyAWSConsulHashiCorpK/VKey ValueSecret KeyService discoveryTerraform
Cybersecurity | Cloud | DevelopmentHow to manage networking in AWS (VPC, SCALE VPC with CIDR value) January 28, 2020 video camera phonefreesharinguploadvideovideo phone
Cybersecurity | Cloud | DevelopmentBrandon Traffanstedt, CyberArk | AWS Marketplace 2018 January 27, 2020 video Dave VellanteJohn FurrierSiliconANGLESiliconANGLE IncSiliconANGLE Media InctheCUBEWikibon