Cybersecurity | Cloud | DevelopmentEthical Hacking Cyber Security Topic topic discussion in English October 27, 2024 video Best CCIE Institute in NoidaCCIECCIE Enterprise infrastructureCCIE InstituteCCIE NoidaccnaCCNA InstituteCCNA NoidaccnpCCNP InstituteCCNP NoidaInstitute in NoidaJNtech NetworksnetworkingNetworking TrainingNetworking training in Noida
Cybersecurity | Cloud | DevelopmentA Recipe for Handling an AWS Network Request from Start to Finish at Global Scale October 26, 2024 video answerArchitectureAWSengineeringhttpnetworkingproblemSecuritysoftwareSoftware EngineeringSolutions
Cybersecurity | Cloud | DevelopmentEthical Hacking Tutorial in Hindi | CEH Training | Ms. Disha Saraswat | Day 2 October 15, 2024 video Best CCIE Institute in NoidaCCIECCIE Enterprise infrastructureCCIE InstituteCCIE NoidaccnaCCNA InstituteCCNA NoidaccnpCCNP InstituteCCNP NoidacehCEH training in hindiCEH tutorialCEH tutorial in hindiCEH tutorialsethical hackingEthical Hacking trainingethical hacking tutorialethical hacking tutorial in hindiethical hacking tutorialshackingInstitute in NoidaJNtech NetworksnetworkingNetworking TrainingNetworking training in Noida
Cybersecurity | Cloud | DevelopmentConfiguring Active Directory Domain Services in a network that has Univention DNS Servers July 27, 2024 video Active DirectoryanswersComputerdeveloperDevopsdomain name systeminternal dnsit professionalnetworkingoperationsquestionSolutionSysAdminSystem AdministratorWindows
Cybersecurity | Cloud | DevelopmentReconcile Terraform Resources the GitOps Way with Priyanka Ravi July 23, 2024 video CI/CDContainersContinuous DeliveryContinuous integrationDevopsDevSecOpsDockergit opsgitopshashi terraformHashiCorpK8skuberneteskubernetes clustersLinuxnetworkingsdnTerraformtf controllerweave
Cybersecurity | Cloud | DevelopmentAzure Landing Zone Accelerator for AVS – Using a Central Hub in Azure July 8, 2024 video azopsazureazure familyAzure VMware SolutionITOpsMicrosoft Azurenetworking
Cybersecurity | Cloud | DevelopmentOWASP AppSecUSA 2011 Why do developers make these dangerous software errors May 18, 2024 video AlliterationApplicationsArchitecturearmAssemblyBinariesblackblackhatBusinesscentosComputercomputingdebianDEFCONengineeringenvironmentExploitsfirewallshackerhackingintroductioniphoneLinuxmodemsnetworknetworkingredhatreverseRootkitsroutersschooconSecuritysoftwareswitchesTrustedvistaWindowsxp
Cybersecurity | Cloud | DevelopmentHow Flux and Pulumi Give Each Other Super Powers by Michael Bridgen February 18, 2024 video ContainersDockerfluxflux cdfluxcdgitopsIaCInfrastructure as CodekubernetesLinuxnetworkingociOCI supportopen container initiativepulumisdnweave
Cybersecurity | Cloud | DevelopmentNmap tutorial: Ethical Hacking- How to Use Nmap Like a Pro #nmap #ethicalhacking #ceh #cybersecurity January 10, 2024 video blue teamcertfirstcloudcloud securiycomptiacyberCybersecurityeccouncilethical hackingethicalhackinghackhackingInfoseclearn2hackLinuxnetwork mappernetworkingnmapnmap scannernmap scriptingportsprotocolsprogrammingpythonpythongred teamscriptingSecurityzenmap
Cybersecurity | Cloud | DevelopmentChallenges in Building Multi-Cloud-Provider Platform With Managed Kubernetes – Joerg Schad, PhD December 29, 2023 video all things openArangoDBato2020autoscalercloudcluster provisioningJoerg Schad PhDkubernetesnetworkingnode sizingOpen SourceTechnology