Articles in this series
Learning "Kubernetes The Hard Way" project by Kelsey Hightower. 路 Background I've recently been working a lot more with Kubernetes across various...
In this path as a defender, you'll investigate a successful attack by using jq & Athena to analyze CloudTrail logs in JSON. 路 This is a walkthrough of...
What should you know as a cloud security engineer or for a cloud security interview? 路 A list of things to know as a cloud security engineer or for a...
In this path as an attacker, you鈥檒l exploit your way through misconfigurations in Lambda (serverless functions) and containers in ECS Fargate. 路 This is...
Respond to an AWS security incident by analyzing cloud trail logs. 路 This is a walkthrough for "Bucket" by CyberDefenders Scenario Video...
Flaws.Cloud - Learn about common mistakes and gotchas when using Amazon Web Services (AWS) including S3, IAM, EC2, and more. 路 This is my walkthrough for...