Week 2: Coursera AWS Fundamentals Specialization

INTRODUCTION The first thing we will set our sights on is securing your infrastructure, which will begin with network isolation and endpoint security,, while moving on to detective controls, namely, Amazon CloudTrail, AWS Security Hub, Amazon GuardDuty, and AWS Config. WEEK 2 QUIZ 1 1. Which statement is true? You can only attach 1 elastic … Read more

Week 4: Coursera AWS Fundamentals Specialization

INTRODUCTION We will start with securing compute resources such as Amazon EC2 and AWS Lambda, manage secrets, and finally summarize the AWS Well-Architected Framework. WEEK 4 QUIZ 1. W​hich of the following are valid Pillars of the Well-Architected Framework? Choose two. Infrastructure Redundancy Speed Security (CORRECT) Cost Optimization (CORRECT) 2. W​hat language does Amazon Athena support? ​SQL (CORRECT) … Read more

Week 1: Coursera AWS Fundamentals Specialization

INTRODUCTION Migration: The first week of this course, which forms a short introduction to the concept before delving into some background reading material, also presents the outline of the rest of the course. Then you get to learn why migration is an important subject, the different types of migration, and the three-phase migration structure. You … Read more

Module 2: Incident Response

INTRODUCTION – Incident Response It will focus on the very specific stages of incident response, the necessity for documentation during incidents, and the essential elements of an incident response policy. Objectives of Learning: Change the hierarchy settings for networks in QRadar. Generate QRadar reports.Investigate QRadar offenses using QRadar SIEM. Summarize how to govern your incident … Read more

Module 3: Digital Forensics

INTRODUCTION – Digital Forensics This module will cover the forensic process, different sources of forensic data, and the importance of the chain of custody during digital forensics. Learning Objectives: Methods to identify a cyberattacker using network data Synthesize various sources of network data and data obtainable from each Describe the Layers of TCP/IP model and … Read more

Module 4: Introduction to Scripting

INTRODUCTION – Introduction to Scripting Throughout this module, you will appreciate the need for scripting in cybersecurity, familiarize yourself with different scripting languages, and develop skills in Python scripting. Find below the benevolent objectives. Define a Python library and give examples. Discuss Python functions vs. methods. Give syntax of conditions in Python branching. Describe Python … Read more

Module 2: Data Loss Prevention and Mobile Endpoint Protection

INTRODUCTION – Data Loss Prevention and Mobile Endpoint Protection In this complete module, you will probe into the critical topics of data loss prevention tools, their essential risks, and the strategic management of mobile endpoints. Careful analysis of these subjects will provide you with insight into securing sensitive information, threatening mitigation, and enhancing the security … Read more

Module 3: Scanning

INTRODUCTION – Scanning You’re reading a training course on the part that leads to the knowledge of scanning technologies and their role in cybersecurity. This module will take you into a complex variety of scanning methodologies and present how they fortify the defenses of any digital infrastructure, identifies the vulnerabilities, and even detects threats that … Read more

Module 2: Introduction to Software Development

INTRODUCTION – Introduction to Software Development Fundamentals of Application Development Module 1 introduces students to the basic elements in application development. In Lesson 1, the student will learn the differences between front-end and back-end development in web and cloud applications and the technologies used in each. It also includes a discussion of teamwork and pair … Read more

Module 2: Monitoring & Managing in Microsoft Azure

INTRODUCTION – Monitoring & Managing in Microsoft Azure This module involves studying monitoring and management tools and services from Microsoft Azure. This will extensively cover the tools, and then learn to determine the best resources to tackle various business and technical problems. This will give the user insight into the decision-making process relating to the … Read more