Cybersecurity | Cloud | DevelopmentCybersecurity Reference Architecture: 03 Threat Detection June 30, 2020 video camera phonefreesharinguploadvideovideo phone
Cybersecurity | Cloud | DevelopmentWindows Server Administration Fundamentals: 07 Popular Windows Network Services and Applications June 28, 2020 video camera phonefreesharinguploadvideovideo phone
Cybersecurity | Cloud | DevelopmentHow to Harden Your Enterprise in Today’s Threat Landscape: 02 The Security Challenge June 27, 2020 video camera phonefreesharinguploadvideovideo phone
Cybersecurity | Cloud | DevelopmentLemonLDAP::NG 2.0 June 27, 2020 video camera phonefreesharinguploadvideovideo phone
Cybersecurity | Cloud | DevelopmentCreating identities for my API's and assign them in the Azure Active Directory June 27, 2020 video camera phonefreesharinguploadvideovideo phone
Cybersecurity | Cloud | DevelopmentS208 – Microservices with .NET on Service Fabric – Sudhanva Huruli, Vaclav Turecek June 26, 2020 video camera phonefreesharinguploadvideovideo phone
Cybersecurity | Cloud | DevelopmentS304 – Creating a CI/CD Pipeline for Kubernetes Using Azure DevOps – Christian Meléndez June 26, 2020 video camera phonefreesharinguploadvideovideo phone
Cybersecurity | Cloud | DevelopmentThe Java Ecosystem Collision: What is the Future of Cloud Native? – Erin Schnabel, IBM June 25, 2020 video camera phonefreesharinguploadvideovideo phone
Cybersecurity | Cloud | DevelopmentLogins and passwords — What you need to know about Identity Management in Higher Ed June 24, 2020 video camera phonefreesharinguploadvideovideo phone
Cybersecurity | Cloud | DevelopmentDEF CON 15 – Plet – Stealing Identity Management Systems May 4, 2020 video camera phonefreesharinguploadvideovideo phone