Cloud and Kubernetes Security certified
As I post more content, I will diversify what is shown here just to spice things up. That is also how I deal with burnouts, can’t do the same thing all the time and expect ideas, a fresh view on things, and improvement.
What I’m working on
Hands-On AWS Skills Without Breaking the Bank: My Cloud Journey So Far
I’m immensely grateful for the free and affordable hands-on resources available to learn AWS. Influencers like Network Chuck have provided invaluable content, while AWS itself offers numerous programs to help build cloud skills that are on the job applicable to drive improvements and innovation. While I believe in the value...
Malware Sample Analysis
In this blog post-in-progress I am going to analyze the malware sample sha256:cc8867a5fd62b82e817afc405807f88716960af5744040999b619b126a9ecf57 and provide beginner-friendly resources to start with malware analysis. Let's get started! Filename: cc8867a5fd62b82e817afc405807f88716960af5744040999b619b126a9ecf57.exe Internal (Original) Name: dwm.exe Size: 243,361 bytes Time/date stamp: Thu Jan 01 18:12:16 1970 (UTC) Compiler: MinGW(GCC: (GNU) 4.8.2) MD5: 8b282ef8f441ccceb707a9ee04a541 SHA-256: cc8867a5fd62b82e817afc405807f88716960af5744040999b619b126a9ecf57 Imphash:...
Getting Started with Microsoft Azure Security: Attacking and Auditing
This blog post summarizes beginner-friendly ways to get hands-on with Microsoft Azure Security. It compiles useful resources for upskilling, including creating a home lab, practicing attacks and audits, and preparing for relevant certifications. As innovation increasingly relies on cloud technologies, securing these environments becomes vital for maintaining customer trust and...
Getting Started with AWS Security: Attacking and Auditing
Continuing on the topic of Cloud Security, this post will cover AWS Security basics holistically, focusing on attacking and auditing an AWS environment with sample open-source tools.This is not a step-by-step guide but a beginner-friendly overview, including learning resources at the end to help you continue exploring. You'll also find...
Projects
LAB: TELEPHONY SERVICE, PORT SECURITY, DHCP POOL
Theme: Here's my number, so call me maybe? Jam Author: Carly Rae Jepsen Certification Level: Cisco CCNA Let's do this! DESCRIPTION: I created this lab with the goal to practice establishing calls in Packet Tracer at the CCNA level. The lab has no strict requrements, use provided free resource, practice...
Qwiklabs Walkthrough - Securing GKE Run Time with Prisma Cloud
Check out the walkthrough HERE. In this Qwiklab Walkthrough, Prisma Cloud is used to secure runtime aspects of a GKE Cluster: https://www.cloudskillsboost.google/focuses/10888?parent=catalog Relevant links: How to get a free Qwiklabs pass Prisma Cloud Administrator's Guide
Architecture diagrams in AWS Quest: Security
As I recently completed all 24 practice labs and DIY assignments from AWS Cloud Quest: Security, I wanted to save all architecture diagrams from the quest so I could refer to them along my cloud security journey. INTRODUCTION: As said on Amazon Web Services Training and Certification Credly page for...
Kubernetes threat detection with Falco Sidekick
Let me quickly walk you through how to set up a basic Kubernetes threat detection homelab on Kali Purple. I'll start from a freshly installed of Kali Purple VM - so-called SOC-in-a-box, then install minikube - to easily manage local k8s cluster, and finally install containerized Falco with it's Sidekick...
Experience
| April, 2022 - October, 2023
| April, 2024 - December, 2024
| December, 2014 - January, 2022