
AWS Geolocation Policy vs. Geoproximity Policy
A quick look at two Route 53 routing policies.
A quick look at two Route 53 routing policies.
Looking at the AWS six advantages of cloud computing and providing real-world examples.
How to change the Azure Log Analytics retention period.
Azure Security with baselines.
The risk of playing security guesswork.
Quickly create multiple TXT records in AWS Route 53.
Configure Azure SQL Backup retention and restore a point in time database.
How to remove a switch from a Cisco switch stack.
How to change Time Zone of Azure Virtual Machines.
How to get Chocolatey up and running on Windows
Learn how to rate limit a host with Cisco ASA
Perform packet captures on a Cisco ASA firewall.
A look of the key differences of AWS IAM Policies and Roles.
Guide to install Apache on AWS using user data scripts.
How to quickly configure SNMP on Cisco switch and router.
How to configure DHCP Scopes for separate VLANs- Cisco.
How to pass CISM on first attempt.
Part 1 of the AWS Cloud Resume Challenge. Building a Static S3 Website and Implementing CloudFront.
Quickly go from a DHCP address to Static via command line.
Looking at the mindset of a consultant, beyond technical skills.
Quickly create a GitHub repository from the command line
CVE CVSS and KEV Building Your Vulnerability Management Foundation
Explore the strategies I used to successfully pass the GitHub Foundations Exam and validate my GitHub skills.
How to reset fortigate firewall with no console cable.
How to resolve SSL VPN disconnects with Fortinet firewalls.
How to specify the source interface for ping- Fortinet.
How to install Expressive Code on an Astro blog.
Troubleshoot when the Freeradius service will not start on your server.
Running and reviewing Fortinet High Availability Commands.
Reflecting on goals and accomplishments as I look ahead to the rest of 2023 and plan for future success.
Practical tips to become a senior engineer and advance your career in IT consulting.
Taking a look at a new approach to securing SaaS applications with complete visibility and control.
Understanding the OWASP key web application security risks and how to mitigate them.
A framework for responding to alerts in the cloud and maintaining operational excellence.
Overly permissive users lead to Salesforce data breach and the importance of SSPM solutions.
Exploring the crucial components within SSPM security checks and how they secure SaaS environments.
What to look for when you are ending a SaaS contract to maintain security and compliance.
A checklist to assess SaaS vendor security during the due diligence process.
Ensure a secure and compliant integration when introducing a new system into an existing security boundary.
A reusable starting point for building a cybersecurity program using Assess, Manage, and Validate pillars.
How engineers can showcase invisible value and make their security work visible during sprint demos.
Integrating security into every phase of cloud software development with SSDLC best practices.
How I passed the HashiCorp Terraform Associate exam.
How to uninstall the ManageEngine agent on macOS when the standard method does not work.
Magic 8 ball app in Python using random selection and user input.
Set up your terminal with this Oh My Zsh quick config guide for iTerm2 on macOS.
An introduction to prompt engineering and its applications in AI.
Understanding the differences between pre-commit hooks and pipeline security scans in DevOps.
The Python cheatsheet I wish I had when I first started learning Python, featuring Mario Bros examples.
The YAML cheatsheet I wish I had when I first started learning YAML