Cybersecurity | Cloud | DevelopmentKeynote Talk on Cyber Security and Symmetric Key Encryption February 22, 2021 video Access ControlAESAIassignmentcode for beginners tutorialcomputecrypto systemcryptographycyber attackcyber securityDBMSdecryptiondeep learningDESdiyECCencryptionFLATguideHow toIDSinformation securityinstallintrusion detectionLATEXlearn to programlecturemachine learningMLNetwork Securityprivate keyprogrammingpublic keypythonrsascientific computingSecuritySHASQLTOCtutorial“computer laboratory” computer science GATE
Cybersecurity | Cloud | DevelopmentSimplify identity and access management with SAP Cloud Identity Access Governance December 20, 2020 video accessAccess ControlAccess Governanceaccess riskCloud IAMfirefighterGRCIAMIdentity Managementprovisioningrole managementSAPsap firefighterSAP GRCsegregation of dutiessodSSO
Cybersecurity | Cloud | DevelopmentControlling EKS access with AWS IAM September 16, 2020 video Access ControlAWShasgeekSSH access
Cybersecurity | Cloud | DevelopmentThe Cyber Underground – The Current Threat Landscape in Academia July 30, 2020 video AcademiaAccess Controlcyber securitydirty networkDiversificationEconomyEnergyGlobalizationHawaiihostile networkitopen securitypopulartechThink Tech Hawaiiuniversity of hawaii
Cybersecurity | Cloud | DevelopmentConfiguration of 802.1X over Wi-Fi on Windows 2016 with NPS, ADDS, ADCS Roles February 19, 2020 video 2016802.1xAccess ControlActive DirectoryAuthenticationdomain controllerEAPLANMSCHAP V2networkNetwork Policy ServerNPSPEAPPolicyRadiusSecurityServerWindowsWPA2 Enterprise