This course compares the types of encryption available on Linux and explores when and how to use them. We will also discuss some best practices and how to securely delete data. Finally, we’ll put this knowledge to work by creating and mounting different encrypted file systems and troubleshooting common problems with each.
Table of contents
About the author
A Cloud Guru
The Cloud Content team comprises subject matter experts hyper focused on services offered by the leading cloud vendors (AWS, GCP, and Azure), as well as cloud-related technologies such as Linux and DevOps. The team is thrilled to share their knowledge to help you build modern tech solutions from the ground up, secure and optimize your environments, and so much more!