Download all presentations in Keynote or Powerpoint.
Play here or download on slideshare
Hackers and Cyber Attacks
Authentication vs. Authorization Explained - What is the Difference and How do They Work? Aly Khayrulina.
OAuth 2 Introduction
Encryption Part 1: Introduction to encryption Shane Killian
Introduction to Key Management Patrick Townsend
GDPR explained: How the new data protection act could change your life Anja Popp
Schneier on Security
‘The Basics of Web Application Security’
‘Excess XSS: A comprehensive tutorial on cross-site scripting’
‘Certificates and Authentication’
‘5 Common Encryption Algorithms and the Unbreakables of the Future’
‘What is GDPR? The summary guide to GDPR compliance in the UK’
Password strength checker