Here you'll find a list of my IT training courses. Amazon Web Services (AWS) Architecting for Operational Excellence on AWS Architecting for Reliability on AWS Architecting for Security on AWS AWS Networking Deep Dive: Elastic Load Balancing (ELB) AWS Networking Deep Dive: Route 53 DNS AWS Networking Deep Dive: Virtual …
Read MoreWhether you prefer to read or watch a video, here are some AWS certification training resources I've put together for you. Study Guides The following study guides include hundreds of assessment questions and answers as well as online access to graded practice exams. The AWS Certified Solutions Architect Study Guide: …
Read MoreAbout three years ago, the following phrase popped into my head: "Social media is making you have stupid opinions." Now that's obviously not directed at you, and when I had the thought it wasn't about anyone in particular. It was more of a general observation that social media is antithetical to critical …
Read MoreAWS Certified Solutions Architect Study Guide: Associate SAA-C02 Exam 3nd Edition AWS Certified Solutions Study Guide: Associate (SAA-C02) Exam, Third Edition comprehensively and efficiently prepares you for the SAA-C02 Exam. The study guide contains robust and effective study tools that will help you succeed on the …
Read MoreWhile playing around with AWS CloudWatch Log Insights to analyze VPC flow logs, I thought of a couple of fun ways to identify (probably) malicious traffic. Finding Vulnerability Scanners These are the guys that hammer your box looking for anything from silly SQL injection attacks (so 2005) to CSRF vulnerabilities. The …
Read MoreMy latest course “Architecting for Security on AWS” is now available on Pluralsight! You’ll learn how to secure your data and AWS services using a defense-in-depth approach, including: Protecting your AWS credentials using identity and access management Capturing and analyze logs using CloudTrail, CloudWatch, and …
Read MoreUnderstanding the Meltdown Attack
Jan 5, 2018 securityThis month, security researchers released a whitepaper describing the Meltdown attack, which allows anyone to read the full physical memory of a system by exploiting a vulnerability in Intel processors. If that sounds bad, that’s because it is. It means that if you’re running workloads on a public cloud provider, and …
Read MoreSecurity usually requires sacrificing convenience (or money). So naturally, we tend to get away with as little security as possible. But if you’re a glutton for punishment, here are 4 very inconvenient but highly effective measures you can take right now to protect yourself from the evils lurking on the interwebs. …
Read More