Home
<   Dockumentation   >
Cancel

CompTIA Security plus SYO-701 Chapter 1

Security Controls The bad actors are look at different way that they can get access to our systems. SO, as a security professional, we have to make sure we are protecting all aspects of our organization from building to people to systems. We have to consider assets, which might be physical assets like hardware, data, software inventory etc. Now...

Containerizing Microservices using Docker on AWS [DevOps Project Part-2]

Infrastructure as Code :: Terraform The main reason why terraform is highly sought out is because it is vendor agnostic. Terraform syntax and structure is consistant across cloud providers. We can also extend terraform to other services like local. Hence, to work with terraform, one must only understand how terraform works and all its component...

AWS Account creation using AWS Organization and Azure SAML Integration

Introduction In this document, we are going to create a new AWS account within my organization in AWS organization. Once the account is created, we are also going to integrate it with Entra AD using AWS Single Account Signon Enterprise application. One of the main reasons I like this approach is that, I can see all my AWS Accounts that I have a...

Containerizing Microservices using Docker on AWS [DevOps Project Part-1]

End to End DevOps E-Commerece project. This document going to outline one of the open source demo application and use that application to implement all the devops solutions and best practices. The demo application we are going to look at is the OpenTelemetry’s E-Commerce application. The following is the architecture of the application by open...

Attack and Defend Lab in AWS

Attack and Defend Lab in AWS Cloud This document outline we are going to setup a security lab within AWS cloud environment. In this lab, we are going to spin up three instances one netspectrum ubuntu, that allow us to access the instance over a browser, along with a windows instance to send the events logs over to our splunk instance via univer...

Microsoft Cybersecurity Analyst

AZ-500 Azure Security Engineer Associate Certification[part-1]

Introduction The following are the topics, on a high level, that we are going to dive into in-order to prepare for azure security engineer associate certificate. Secure access with Azure Active Directory :: Create and manage user across on prem and cloud Identity protection nad governance :: PIM, Role based access and azure p...

GitOps Infrastructure as Code using Crossplane

Introduction This document outlines on how we can use crossplane in integration with argo cd to create resources in cloud. This document will not dive deep into the what and how crossplane works or the argocd. Here, I am going to outline the steps the would help create resources using infrastructure as code with crossplane Pre requisites Cros...

Self Signed Certificates for kubernetes with Cert Manager and Traefik

Introduction In this document, we are going to look at the steps on how we can configure traefik with cert manager to generate self signed certificates for my kubernetes services. Previously, I have also outline how we can set up traefik for containers to generate self signed certificates services deployed in a containerized environments. Sel...

Deploy Kubernetes cluster with K3s and kubernetes dashboard for monitoring

Introduction In this document I am going to outline the steps that on how I have set up my kubernetes cluster along with an overview of issue I have faced during the installation and how I was able to fix them or workaround them. Once I have my cluster inplace, I have also deployed a light weight kubernetes dashboard to monitor my cluster as we...