[OWASP Top 10]: API Security Basics ~Series 1~ Security principlesWe will cover the important security principles for API security standards.Mar 11, 2022Mar 11, 2022
[Road to Cloud Security Engineer] Series 1 ~Understand Microservices~In this series, you will learn how to become a Cloud Security Engineer. Series 1 is to understand Microservices.Mar 6, 202220Mar 6, 202220
[OWASP Top 10]: API Security Basics ~Series 2~ Risks and CountermeasuresOverviewJan 28, 202210Jan 28, 202210
[Offensive security] How toconduct server-side request forgery (SSRF)What we will do in this articleJan 18, 20225Jan 18, 20225
[Offensive security] Let’s steal the confidential files from the misconfigured S3 bucket.What we will do in this articleJan 17, 20226Jan 17, 20226
[Malware Analysis Bootcamp] Let’s start your first malware analysis!!What Is Malware Analysis?Jan 17, 202230Jan 17, 202230
[Wireshark]Cyber security analysis and identify common cyber network attacksoverviewJan 15, 20225Jan 15, 20225
[Vulnerability management]How to manage vulnerabilities using Nmap and OpenVASOverviewJan 13, 2022Jan 13, 2022
[EventBridge]Create a Serverless EventBus Using Amazon EventBridgeoverviewJan 11, 202220Jan 11, 202220
[Amazon Kinesis] How to extract Anomalous events from Amazon Kinesis Streams with Kinesis Data…overviewJan 10, 2022Jan 10, 2022
[AWS API Gateway, EKS] Access an Amazon EKS Cluster with an API Gateway!!OverviewJan 10, 20222Jan 10, 20222
[AWS security]Monitor Non-compliant and Unsecure Resources with AWS ConfigoverviewJan 8, 2022Jan 8, 2022
[Container & K8s security]Containerize Applications and Deploy them using Kubernetes with security…OverviewJan 2, 2022Jan 2, 2022
[Docker security] An Overview of Docker Security EssentialsIn this article, we will see the best practices for Docker host security based on 6 scenarios.Jan 1, 2022Jan 1, 2022
Published inFAUN — Developer Community 🐾[DevOps] Create your first CI/CD pipeline!!What is CI/CD pipeline?Jan 1, 20225Jan 1, 20225