Example Curriculum
Available in
days
days
after you enroll
- How to Create Account in AWS (7:08)
- How to Launch Linux OS in AWS Cloud (17:31)
- How to Use Putty to Connect to Linux Instances in AWS Cloud (18:39)
- Linux Basic Commands (44:14)
- How to Download RedHat Linux at No Cost (3:48)
- How to Install RedHat OS RHEL8 Over Oracle Virtualbox (38:02)
- How to Configure YUM/DNF in RedHat RHEL8 (42:11)
Available in
days
days
after you enroll
- Session 1 - 2nd August- Importance of HAProxy in Load Balancing | Load Balancing | Reverse Proxy | Concept of Backend and Frontend Servers | Configuration of HAProxy (156:21)
- Session 1 - Summary
- Session 2 - 3rd August- Fetch | HTTPD Header | Access Control List | Configuration of Servers | Detailed Description of Timeouts | Name and Inline based rule (137:36)
- Session 2 - Summary
- Session 3 - 5th August - Hybrid Key Set Up | IP snooping | Certificate Authority | CSR | CRT | Create root CA (148:43)
- Session 3 - Summary
- Session 4- Load Balancer Algorithms | Statistics about HAProxy | Weighted and Unweighted Round Robin Algorithm | Least Connection Algorithm | Static Round Robin Algorithm | Sticky Session | Configuration of Frontend and Backend Servers (119:54)
- Session 4- Summary
- Session 5- High Availability | Single Point of Failure | Client App | DNS Health Checking | VRRP | Keepalive Program | Virtual IP | Monit Tool (119:51)
- Session 5 - Summary
- Session 6 - Fetch | HAProxy for DDOS attack | stick table | Set-up API by UNIX Socket | Socat | Socket Creation | Threading | bench marking tool | performance tuning | SSL/TLS Termination | end to end Termination | Pass through (151:47)
- Session 6 - Summary
Available in
days
days
after you enroll
- Understanding Cryptography Beyond Encryption: Importance and Use Cases (23:15)
- Summary - Understanding Cryptography Beyond Encryption: Importance and Use Cases
- Securing Webpages with Cryptography Techniques on AWS (96:31)
- Summary - Securing Webpages with Cryptography Techniques on AWS
- Understanding SSL | Cipher Modes of Operation and Symmetric Key Authentication (79:55)
- Summary - Understanding SSL | Cipher Modes of Operation and Symmetric Key Authentication
- Understanding CBC Mode | CFB Cipher Mode | HSM Devices | Counter Mode (CTR) (39:03)
- Summary - Understanding CBC Mode | CFB Cipher Mode | HSM Devices | Counter Mode (CTR)
- Understanding AES256 | SHA256 | GCM | Hashing | MAC | Symmetric Key | Authentication (43:28)
- Summary - Understanding AES256 | SHA256 | GCM | Hashing | MAC | Symmetric Key | Authentication
- Understanding Hash | Encryption, and Data Integrity (90:32)
- Summary - Understanding Hash | Encryption, and Data Integrity
- Security Measures | Breaking AES | Sniffing Methods (32:39)
- Summary - Security Measures | Breaking AES | Sniffing Methods
- Exploring the World of Asymmetric Key Cryptography: From RSA to Shor's Algorithm (67:00)
- Summary - Exploring the World of Asymmetric Key Cryptography: From RSA to Shor's Algorithm
- Cryptography and Security: Digital Signature | Public Key | Hybrid Encryption | Cryptosystem (108:05)
- Summary - Cryptography and Security: Digital Signature | Public Key | Hybrid Encryption | Cryptosystem
- ROOT CA, SUB CA, SSL/TLS Handshake | CSR | CRT | and Self-Sign Concept for Secure Web Connections (142:30)
- Summary - ROOT CA, SUB CA, SSL/TLS Handshake | CSR | CRT | and Self-Sign Concept for Secure Web Connections
- Practical implementation of Root CA | Sub CA | SSL/TLS Handshake | CSR | CRT | Self-Sign Concept (119:50)
- Summary - Practical implementation of Root CA | Sub CA | SSL/TLS Handshake | CSR | CRT | Self-Sign Concept