There are no items in your cart
Add More
Add More
| Item Details | Price | ||
|---|---|---|---|
Elevate your DevOps skills with SSL, Redis, messaging queues, and more.
Instructor: Vansh Dixit
Language: HINDI / ENGLISH
Validity Period: Lifetime
Description:
This course is designed to advance your knowledge in DevOps by focusing on SSL implementation, Redis database, messaging queuing systems, authentication & authorisation protocols, and MySQL database management. Through practical exercises and real-world scenarios, you will deepen your expertise in these essential components of modern IT infrastructures.
Key Highlights:
What you will learn:
| SSL | |||
| Part 2 | |||
| What is SSL & TLS ? What is HTTPS ? What is an SSL VPN? - Practical TLS 8:00 | |||
| How do SSL & TLS protect your Data? - Confidentiality, Integrity, Authentication - Practical TLS 5:00 | |||
| Anti-Replay and Non-Repudiation - Practical TLS 5:00 | |||
| Key Players of SSL & TLS: Client, Server, Certificate Authority (CA) - Practical TLS 6:00 | |||
| TLS / SSL Versions - Practical TLS 14:00 | |||
| TLS / SSL Versions -Practical TLS 6:00 | |||
| Hashing, Hashing Algorithms, and Collisions - Cryptography - Practical TLS 12:00 | |||
| Data Integrity - How Hashing is used to ensure data isn't modified - HMAC - Cryptography 7:00 | |||
| Encryption - Symmetric Encryption vs Asymmetric Encryption - Cryptography - Practical TLS 14:00 | |||
| Public and Private Keys - Signatures & Key Exchanges - Cryptography - Practical TLS 13:00 | |||
| How SSL & TLS use Cryptographic tools to secure your data - Practical TLS 8:00 | |||
| Public Key Infrastructure - What is a PKI? - Cryptography - Practical TLS 6:00 | |||
| RSA Algorithm - How does it work? - I'll PROVE it with an Example! -- Cryptography - Practical TLS 16:00 | |||
| Diffie-Hellman Key Exchange - the MAGIC that makes it possible - Cryptography - Practical TLS 7:00 | |||
| Digital Signature Algorithm (DSA) - Cryptography - Practical TLS 6:00 | |||
| TLS / SSL - The complete sequence - Practical TLS 6:00 | |||
| What are Cipher Suites? - Practical TLS 5:00 | |||
| HSTS - HTTP Strict Transport Security - Protect against SSL Stripping attack - Practical TLS 10:00 | |||
| TLS Handshake - EVERYTHING that happens when you visit an HTTPS website 28:00 | |||
| TLS 1.3 - What Changes? What stays the same? 8:00 | |||
| TLS 1.3 Cipher Suites - Here is what CHANGES! 17:00 | |||
| TLS 1.3 Handshake - many CHANGES from prior versions! 18:00 | |||
| TLS 1.3 - Changes to Session Renegotiation - Practical TLS 14:00 | |||
| TLS 1.3 - Changes to Session Resumption - Practical TLS 16:00 | |||
| Part 3 | |||
| Java Keytool Tutorial : Part 1 - Introduction to Keytool 15:00 | |||
| Java Keytool Tutorial: Part 2 - What is a KeyStore? 17:00 | |||
| Java Keytool Tutorial : Part 3 - Migrating a KeyStore 14:00 | |||
| Cryptography : What is a Digital Certificate? 32:00 | |||
| Java Keytool Tutorial : Part 4 - Using Certificate Extensions 27:00 | |||
| Java Keytool Tutorial: Part 5 - Using Signed certificate. 27:00 | |||
| Part 4 | |||
| OpenSSL Tutorial | Introduction to OpenSSL 28:00 | |||
| OpenSSL Tutorial | Verifying integrity using OpenSSL. 11:00 | |||
| OpenSSL Tutorial | Encryption using OpenSSL 25:00 | |||
| OpenSSL Tutorial | Generating Key Pairs using OpenSSL 31:00 | |||
| OpenSSL Tutorial | Generating Digital Signatures Using OpenSSL 14:00 | |||
| OpenSSL Tutorial | HMAC and CMAC using OpenSSL 12:00 | |||
| OpenSSL Tutorial | Generating Digital Certificates using OpenSSL 36:00 | |||
| OpenSSL Tutorial | Introduction to OpenSSL Engines 14:00 | |||
| OpenSSL Tutorial | Setting up two-tier CA (Certificate Authority) using OpenSSL 45:00 | |||
| OpenSSL Tutorial | Forks of OpenSSL (LibreSSL and BoringSSL) 10:00 | |||
| OpenSSL Tutorial | CMS using OpenSSL 28:00 | |||
| OpenSSL Tutorial | Key formats used in OpenSSL 28:00 | |||
| OpenSSL Tutorial | Configuring Providers in OpenSSL 3.x 34:00 | |||
| OpenSSL Tutorial | Quick CA - An OpenSSL based Certificate Authority 20:00 | |||
| REDIS | |||
| PART 1 | |||
| Redis Crash Course - the What, Why and How to use Redis as your primary database 24:00 | |||
| Redis Tutorial for Beginners | Learn Redis in 90 minutes 98:00 | |||
| PART 2 | |||
| Redis Tutorial for Beginners - What is Redis? 6:00 | |||
| Redis Tutorial for Beginners - Making a Redis Database (Redis Cloud) 6:00 | |||
| Redis Tutorial for Beginners - Basic Commands 9:00 | |||
| Redis Tutorial for Beginners - Command Options 5:00 | |||
| Redis Tutorial for Beginners - Sets 6:00 | |||
| Redis Tutorial for Beginners - Lists 8:00 | |||
| Redis Tutorial for Beginners - Hashes 8:00 | |||
| Redis Tutorial for Beginners - Redis Client Library 10:00 | |||
| Redis Tutorial for Beginners - Using Redis with Next.js 7:00 | |||
| Redis Tutorial for Beginners - Sorted Sets 12:00 | |||
| Redis Tutorial for Beginners - Pipelines 9:00 | |||
| Redis Tutorial for Beginners - Redis Stack Introduction 10:00 | |||
| MESSAGE QUEUING | |||
| What is a Message Queue? 16:00 | |||
| Message Queues in System Design 5:00 | |||
| What is a MESSAGE QUEUE and Where is it used? 10:00 | |||
| What is RabbitMQ? 10:00 | |||
| RabbitMQ in 100 Seconds 3:00 | |||
| RabbitMQ Crash Course 43:00 | |||
| What is Message Queue | RabbitMQ | Kafka | System design basics 22:00 | |||
| Amazon MQ - Managed Message Broker Service 18:00 | |||
| IBM MQ: What is it, and why do developers need it? 3:00 | |||
| System Design: Apache Kafka 4:00 | |||
| RabbitMQ Tutorial - Message Queues and Distributed Systems 31:00 | |||
| AUTHENTICATION & AUTHORISATION | |||
| LDAP | |||
| what is Remote LDAP Authentication | |||
| LDAP - Directory Information Tree 3:00 | |||
| LDAP - Design Directory Information Tree 4:00 | |||
| LDAP Demo - Command Line Tool 6:00 | |||
| LDAP Server Setup 5:00 | |||
| What is ldap authentication 3:00 | |||
| What is directory server | |||
| What is directory service 2:00 | |||
| LDAPJWT OAUTH | |||
| What is LDAP and Active Directory ? How LDAP works and what is the structure of LDAP/AD? 11:00 | |||
| HTTPS Security | SSL | TLS | Network Protocols | System Design 14:00 | |||
| What Is JWT and Why Should You Use JWT 15:00 | |||
| What is JWT and Why 15:00 | |||
| How does JWT work | |||
| JSON Web Tokens (JWTs) explained with examples | System Design 11:00 | |||
| Session Vs JWT: The Differences You May Not Know! 7:00 | |||
| OAuth 2.0: An Overview 7:00 | |||
| OAuth 2.0 explained with examples 10:00 | |||
| OAuth 2 Explained In Simple Terms 5:00 | |||
| API Authentication: JWT, OAuth2, and More 6:00 | |||
| Inside AWS Architecture: Journey of a Web Request 8:00 | |||
| MY SQL PHASE 2 | |||
| MySQL Installation Using Debian Packages 7:00 | |||
| MySQL Installation Using Linux Generic Binary and Securing the Installationv1 17:00 | |||
| MySQL Client - Connecting to the Server From a Remote Host 11:00 | |||
| MySQL Client Commands 8:00 | |||
| MySQL Logs 19:00 | |||
| MYSQL Basic Operations 11:00 | |||
| MySQL INFORMATION SCHEMA 9:00 | |||
| Transaction in MySQL 15:00 | |||
| MySQL Deadlock Situation 4:00 | |||
| MySQL Partitioning 16:00 | |||
| Exporting and Importing Data in MySQL 11:00 | |||
| MySQL User Administration 10:00 | |||
| MySQL Backup & Restoration 11:00 | |||
| MySQL Replication (With MySQL Proxy in front) 13:00 | |||
After successful purchase, this item would be added to your Library.
You can access the library in the following ways :