article thumbnail

Free Courses at Linux Academy — August 2019

Linux Academy

Our free cloud training allows students to begin developing their Linux and Cloud skills. Visit the Linux Academy Booth at Black Hat or find Ell at any of the other Hacker Summer Camp events! Kali Linux Deep Dive – In this course, you will learn how to find the vulnerabilities in frameworks like Metasploit, BeEF, SET, etc.

Course 25
article thumbnail

Technology Short Take 155

Scott Lowe

If I’m understanding the article correctly (and feel free to correct me if I am mistaken) it looks as if Cilium Service Mesh will leverage/does leverage a combination of certificate-based mTLS for identity at the workload level and node-based transport encryption (via WireGuard) for data confidentiality. network virtualization). (Hat

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Free Courses at Linux Academy — August 2019

Linux Academy

Our free cloud training allows students to begin developing their Linux and Cloud skills. Visit the Linux Academy Booth at Black Hat or find Ell at any of the other Hacker Summer Camp events! Kali Linux Deep Dive – In this course, you will learn how to find the vulnerabilities in frameworks like Metasploit, BeEF, SET, etc.

Course 12
article thumbnail

Technology Short Take #37

Scott Lowe

A fan of network virtualization might also say that decomposing today’s complex physical networks into multiple simple logical networks on top of a simpler physical transport network—similar to Mike’s suggestion of converging on a smaller set of reference architectures—might also help. (Of All good stuff, thanks Mike!

Vmware 60
article thumbnail

Technology Short Take #38

Scott Lowe

In the process, he muses about the value of configuration management tool chains such as Chef and Puppet in a world of “open switch” platforms such as Cumulus Linux. Speaking of Cumulus Linux…did you see the announcement that Dell has signed a reseller agreement with Cumulus Networks? Good stuff. He’s got it.

Linux 60
article thumbnail

Technology Short Take 116

Scott Lowe

If you’re unfamiliar with public key infrastructure (PKI), digital certificates, or encryption, you may find this Linux Journal article helpful. 509v3 digital certificates, how they help enable asymmetric (public/private key) encryption, and the connection to Transport Layer Security (TLS). It provides the basics behind X.509v3

Storage 60
article thumbnail

Technology Short Take #44

Scott Lowe

One ongoing discussion in the network industry these days—or so it seems—is the discussion about the interaction between network overlays and the underlying transport network. Running Hyper-V with Linux VMs? Ben Armstrong details what versions of Linux support the various Hyper-V features in this post. LTS server.

Linux 60