#cloud-computing
Read more stories on Hashnode
Articles with this tag
In this path as a defender, you'll investigate a successful attack by using jq & Athena to analyze CloudTrail logs in JSON. ยท This is a walkthrough of...
Respond to an AWS security incident by analyzing cloud trail logs. ยท This is a walkthrough for "Bucket" by CyberDefenders Scenario Video...
Flaws.Cloud - Learn about common mistakes and gotchas when using Amazon Web Services (AWS) including S3, IAM, EC2, and more. ยท This is my walkthrough for...