WHAT IS SIEM SIEM stands for – Security Information & Event Management – and is a...
Introduction to Center of Internet Security(CIS) The CIS Critical Security Controls (CSCs)...
Introduction to Industrial Control Systems (ICS) Industrial Control Systems (ICS) consist...
INTRODUCTION The Payment Card Industry Data Security Standard (PCI-DSS) is a set of security...
<VirtualHost *:80> ServerName your_domain.com ProxyRequests Off ProxyPreserveHost...
Steps To Follow Create a VPC and Subnets Create a Security Group Create an Amazon Elastic File...
Recently, I came across an insightful article by on how the Turkish software company 'Codeway'...
Steps: Create an AWS EC2 IAM Role and add CloudWatch and SSM Full Access. - Role Name:...
Summary of Tasks: Create an IAM Role Create an EC2 Create an IAM user Create an AWS KMS encryption...
Summary of Tasks: Create a virtual machine on AWS Setup docker and docker-compose on VM Write a...
Summary of Tasks: Create a virtual machine on AWS Setup docker and docker-compose on VM Write a...
Summary of Tasks: Create a virtual machine (EC2) Install docker & docker-compose Write a...
Summary of the tasks: Step 0: Inspect the architecture 00:02:23 Step 1: Create a...
aws kms key with s3 - how to use aws kms key to encrypt data - aws kms s3 demo Topics to cover in...
As i promised to all my viewers i will continue to upload cloud and education videos on my youtube...