Key Management Courses
Security BSides San Francisco via YouTube Building End-to-End Encryption and User Identity for Video Conferencing - Zoom's Approach
USENIX Enigma Conference via YouTube Crypto Code
WEareTROOPERS via YouTube Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps
IEEE via YouTube Web Application Session Strength
Black Hat via YouTube End-to-end Encryption in Cloud Services
GOTO Conferences via YouTube Building Blockchain Apps with Zero Knowledge
Devoxx via YouTube Keeping Your Java Applications Secure - Cryptographic Improvements and Best Practices
Java via YouTube Perceptions of Distributed Ledger Technology Key Management - Interviews with Finance Professionals
IEEE via YouTube Azure: Compute, Storage, and Database Security
Whizlabs via Coursera