Keeping Your Sites and Users Safe Using SSL
In this Tech Talk, I’ll go over SSL, its history and how it works, and how to secure your sites with SSL so that you can keep your users’ data safe.
Utilizing Security Features in SSH
Securely manage remote systems by making use of the full set of security features SSH has to offer, including strong encryption algorithms, ssh agents, two-factor authentication, and more.
Top 10 Security Practices for Protecting Your Infrastructure
From firewalls, to user privileges, to access controls — this talk will not only explain the how, but also dive into the why of common security practices.
Securing Your Droplet
Secure your Droplet from malicious actors attempting to compromise your systems. This talk will cover the foundations of securing your droplet, protecting your users, and keeping your data safe.
Foundations of Computer Security
An overview of the history and fundamentals of computer security. Explore security best practices, policies, the different threats you might face, and common resources you can use to keep your infrastructure safe.
On my business card, I am a Developer Advocate. In my mind, I am an engineer. But in my heart, I am a teacher