
Week 1 — Day 3: CloudTrail & AWS Config
A full walkthrough of AWS CloudTrail for API auditing and AWS Config for resource configuration tracking and drift detection.

A full walkthrough of AWS CloudTrail for API auditing and AWS Config for resource configuration tracking and drift detection.
Put your TShark skills into practice and analyse some network traffic.

A full walkthrough of AWS Organizations, Service Control Policies, and IAM Permission Boundaries — org-level guardrails that override everything below them.
Short summary of the post for previews and SEO.

A full walkthrough of AWS Identity and Access Management — users, groups, roles, policies, least privilege, and the policy simulator.
First Chapter in bash scripting for Linux
Learn about secure network protocols at the different layers of the OSI model.
Learn techniques for securing and protecting network devices from potential threats and attacks.

WEEK2 - Reconnaissance, Scanning & Web Application Attacks
A comprehensive guide to exploiting Gila CMS vulnerabilities and performing Linux privilege escalation through tar wildcard cron job exploitation.