Autoplay
Autocomplete
Previous Lesson
Complete and Continue
High Performance Load Balancer - HAProxy Training by Mr Vimal Daga
Basic Prerequisite videos
How to Create Account in AWS (7:08)
How to Launch Linux OS in AWS Cloud (17:31)
How to Use Putty to Connect to Linux Instances in AWS Cloud (18:39)
Linux Basic Commands (44:14)
How to Download RedHat Linux at No Cost (3:48)
How to Install RedHat OS RHEL8 Over Oracle Virtualbox (38:02)
How to Configure YUM/DNF in RedHat RHEL8 (42:11)
HAProxy Sessions
Session 1 - 2nd August- Importance of HAProxy in Load Balancing | Load Balancing | Reverse Proxy | Concept of Backend and Frontend Servers | Configuration of HAProxy (156:21)
Session 1 - Summary
Session 2 - 3rd August- Fetch | HTTPD Header | Access Control List | Configuration of Servers | Detailed Description of Timeouts | Name and Inline based rule (137:36)
Session 2 - Summary
Session 3 - 5th August - Hybrid Key Set Up | IP snooping | Certificate Authority | CSR | CRT | Create root CA (148:43)
Session 3 - Summary
Session 4- Load Balancer Algorithms | Statistics about HAProxy | Weighted and Unweighted Round Robin Algorithm | Least Connection Algorithm | Static Round Robin Algorithm | Sticky Session | Configuration of Frontend and Backend Servers (119:54)
Session 4- Summary
Session 5- High Availability | Single Point of Failure | Client App | DNS Health Checking | VRRP | Keepalive Program | Virtual IP | Monit Tool (119:51)
Session 5 - Summary
Session 6 - Fetch | HAProxy for DDOS attack | stick table | Set-up API by UNIX Socket | Socat | Socket Creation | Threading | bench marking tool | performance tuning | SSL/TLS Termination | end to end Termination | Pass through (151:47)
Session 6 - Summary
Cryptography Training
Understanding Cryptography Beyond Encryption: Importance and Use Cases (23:15)
Summary - Understanding Cryptography Beyond Encryption: Importance and Use Cases
Securing Webpages with Cryptography Techniques on AWS (96:31)
Summary - Securing Webpages with Cryptography Techniques on AWS
Understanding SSL | Cipher Modes of Operation and Symmetric Key Authentication (79:55)
Summary - Understanding SSL | Cipher Modes of Operation and Symmetric Key Authentication
Understanding CBC Mode | CFB Cipher Mode | HSM Devices | Counter Mode (CTR) (39:03)
Summary - Understanding CBC Mode | CFB Cipher Mode | HSM Devices | Counter Mode (CTR)
Understanding AES256 | SHA256 | GCM | Hashing | MAC | Symmetric Key | Authentication (43:28)
Summary - Understanding AES256 | SHA256 | GCM | Hashing | MAC | Symmetric Key | Authentication
Understanding Hash | Encryption, and Data Integrity (90:32)
Summary - Understanding Hash | Encryption, and Data Integrity
Security Measures | Breaking AES | Sniffing Methods (32:39)
Summary - Security Measures | Breaking AES | Sniffing Methods
Exploring the World of Asymmetric Key Cryptography: From RSA to Shor's Algorithm (67:00)
Summary - Exploring the World of Asymmetric Key Cryptography: From RSA to Shor's Algorithm
Cryptography and Security: Digital Signature | Public Key | Hybrid Encryption | Cryptosystem (108:05)
Summary - Cryptography and Security: Digital Signature | Public Key | Hybrid Encryption | Cryptosystem
ROOT CA, SUB CA, SSL/TLS Handshake | CSR | CRT | and Self-Sign Concept for Secure Web Connections (142:30)
Summary - ROOT CA, SUB CA, SSL/TLS Handshake | CSR | CRT | and Self-Sign Concept for Secure Web Connections
Practical implementation of Root CA | Sub CA | SSL/TLS Handshake | CSR | CRT | Self-Sign Concept (119:50)
Summary - Practical implementation of Root CA | Sub CA | SSL/TLS Handshake | CSR | CRT | Self-Sign Concept
Teach online with
Summary - Understanding AES256 | SHA256 | GCM | Hashing | MAC | Symmetric Key | Authentication
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock