Haunted : Threat Intelligence Analysis
Overview As part of a simulated cybersecurity investigation, I worked on analyzing and mitigating a complex cyber attack targeting Haunted […]
Haunted : Threat Intelligence Analysis Read More »
Overview As part of a simulated cybersecurity investigation, I worked on analyzing and mitigating a complex cyber attack targeting Haunted […]
Haunted : Threat Intelligence Analysis Read More »
For this lab, we want to use Windows Defender Firewall with Advanced Security to edit an existing firewall rule. We
Configuring Firewall Rules using Windows Defender Firewall with Advanced Security Read More »
Objective To create an AWS EC2 instance using Terraform and set up a WordPress blog on it. Prerequisites Steps 1.
How I created my Portfolio on WordPress using AWS Ec2 instances and Terraform Read More »
Scenario You’ve been brought on as the DevOps resource for a development team that manages a web application that is
Movie Picture Pipeline Read More »
INTRODUCTION The Coworking Space Service is a set of APIs that enables users to request one-time tokens and administrators to
Coworking Space Service Read More »
INTRODUCTION I’m excited to discuss a fascinating project I had the chance to work on this year in this piece.
Deploy a high-availability web app using CloudFormation Read More »