Example Curriculum
Available in
days
days
after you enroll
- How to Create Account in AWS (7:08)
- How to Launch Linux OS in AWS Cloud (17:31)
- How to Use Putty to Connect to Linux Instances in AWS Cloud (18:39)
- Linux Basic Commands (44:14)
- How to Download RedHat Linux at No Cost (3:48)
- How to Install RedHat OS RHEL8 Over Oracle Virtualbox (38:02)
- How to Configure YUM/DNF in RedHat RHEL8 (42:11)
- Basics of Webserver (86:36)
- SSH Protocol (86:10)
- Core Concepts of Networking (81:54)
Available in
days
days
after you enroll
- Understanding Cryptography Beyond Encryption: Importance and Use Cases (23:15)
- Summary - Understanding Cryptography Beyond Encryption: Importance and Use Cases
- Securing Webpages with Cryptography Techniques on AWS (96:31)
- Summary - Securing Webpages with Cryptography Techniques on AWS
- Understanding SSL | Cipher Modes of Operation and Symmetric Key Authentication (79:54)
- Summary - Understanding SSL | Cipher Modes of Operation and Symmetric Key Authentication
- Understanding CBC Mode | CFB Cipher Mode | HSM Devices | Counter Mode (CTR) (39:02)
- Summary - Understanding CBC Mode | CFB Cipher Mode | HSM Devices | Counter Mode (CTR)
- Understanding AES256 | SHA256 | GCM | Hashing | MAC | Symmetric Key | Authentication (43:28)
- Summary - Understanding AES256 | SHA256 | GCM | Hashing | MAC | Symmetric Key
- Understanding Hash | Encryption, and Data Integrity (90:31)
- Summary - Understanding Hash | Encryption, and Data Integrity
- Security Measures | Breaking AES | Sniffing Methods (32:39)
- Summary - Security Measures | Breaking AES | Sniffing Methods
- Exploring the World of Asymmetric Key Cryptography: From RSA to Shor's Algorithm (66:59)
- Summary - Exploring the World of Asymmetric Key Cryptography
- Cryptography and Security: Digital Signature | Public Key | Hybrid Encryption | Cryptosystem (108:04)
- Summary - Cryptography and Security: Digital Signature | Public Key
- ROOT CA, SUB CA, SSL/TLS Handshake | CSR | CRT | and Self-Sign Concept for Secure Web Connections (142:29)
- Summary - ROOT CA, SUB CA, SSL/TLS Handshake | CSR | CRT
- Practical implementation of Root CA | Sub CA | SSL/TLS Handshake | CSR | CRT | Self-Sign Concept (119:50)
- Summary - Practical implementation of Root CA | Sub CA | SSL/TLS Handshake | CSR | CRT
Available in
days
days
after you enroll