In this video you will learn about embedded systems constraints such as: power, compute, network, cryptography & authentication, inability to patch, range, cost, & implied...
In this video you will learn about physical security controls such as: bollards & barricades, access control vestibules, badges, alarms, signage, cameras, closed-circuit television, industrial...
In this video you will learn about more physical security controls such as: USB data blockers, lighting, fencing, fire suppression, sensors, drones, visitor logs, Faraday...
In this video you will learn about cryptographic concepts such as: digital signatures, key length, key stretching, salting, hashing, key exchange, elliptic-curve cryptography, & perfect...
In this video we are going to talk about some more cryptography concepts such as: quantum cryptography, post-quantum cryptography, ephemeral keys, modes of operation, blockchain,...
In this video you are going to learn about even more cryptographic concepts such as: symmetric vs asymmetric encryption, lightweight cryptography, steganography, & homomorphic encryption.
In this video you are going to learn about use cases for cryptographic concepts.
In this video you will learn about implementing secure protocols such as: Domain Name System Security Extensions, Secure Shell, Secure/Multipurpose Internet Mail Extensions, Secure Real-Time...
In this video you will learn about more secure protocols such as: FTPS, SFTP, SNMPv3, HTTPS, and IPsec.
In this video you will learn about various secure protocol use cases such as: voice & video, time synchronization, email & web, file transfer, directory...