Cybersecurity | Cloud | DevelopmentKubernetes Configuration – Auditing for Enterprise Best Practices Through Open Source Tooling May 18, 2021 video ConfigurationfairwindskubernetespolarisSecurity
Cybersecurity | Cloud | Development12 Azure AD Sync Preview May 17, 2021 video #endpointsecurityalaa aminarabic azureazureazure activeAzure IAASazure infrastructure as a servicecloudcomptiacoursfreeinformation securityInfosecisacalearnmicrosoftnetworkSecurityServiceشرحشروحات
Cybersecurity | Cloud | DevelopmentWhat's new in WSO2 Identity Server 5.8.0 May 17, 2021 video agileanalyticsapi managementArchitecture for agileCloud Computingcloud platformDigital TransformationEnterprise integrationIdentity ManagementintegrationIntegration agileIntegration agile platforminternet of thingsmicroservicesmiddlewareOpen SourceOpenID ConnectsamlSecuritysoftwareStream Processorwso2WSO2 Identity Server
Cybersecurity | Cloud | DevelopmentDevOps KC – July Meetup: Dimitri Stiliadis – Identity as the Security Perimeter May 11, 2021 video aporetocloud nativeDevopsdevopskcSecurity
Cybersecurity | Cloud | DevelopmentAWS Technical Essentials Tutorial May 9, 2021 video .NETAlgorithmsAmazonanalyticsandroidapacheapiASP.NETAssemblerAWSC#ciscocmsCSSDatabasedesignFreeDownloadBookGameshackinghardwarehtmlhtml5iOSJavajavascriptKindleLinuxMathematicsmicrosoftnetworknode.jsooporeillyPacktphpprogrammingpythonPythonMLAIrubySecurityseoSwiftTechnical Essentials TutorialWindowsالربح من الانترنتاندرويدبايثونبرمجةتصميمتويترجافاجوجلسكربتسماعصامعمرفيس بوك
Cybersecurity | Cloud | Development2019 – Everything-as-Code – Anything Secure? May 7, 2021 video Day 1Free SoftwareFrOSConFrOSCon 2019froscon2019froscon2019 deufroscon2019 ovhochschule Bonn Rhein SiegHS4Jan SudmeyerlectureOpen SourcescienceSecurityWinkekatze
Cybersecurity | Cloud | DevelopmentDay 1 Part 2: Intro Trusted Computing May 3, 2021 video attestationAuthenticationclassesComputercomputer securitycomputer security classcryptographycyber securityCybersecuritydecryptiondigital signaturesDRTMdynamic root of trusteducationencryptionOpenSecurityTraining.infoPCRPCRsSecuritySRTMstatic root of trustTPMtrainingtrustTrusted ComputingTrusted Computing Grouptrusted hardwareTrusted Platform Module
Cybersecurity | Cloud | DevelopmentHow to leverage AWS features to secure and centrally monitor your accounts – Kate Whalen May 2, 2021 video AWSDevopsDevOpsDaysSecurity
Cybersecurity | Cloud | DevelopmentInformation Security Awareness PSA: "The Virus" April 25, 2021 video AwarenessCIOCIOscomputer securityeducation technologyEDUCAUSEHEISCHigher Edhigher educationHigher Education Information Security Councilinformation securityinformation technologyPSA contestSecurity