AWS Cloud Practitioner

Objective Weighting Cloud Concepts 28% Security 24% Technology 36% Billing and Pricing 12% Before exam read the whitepapers Architecting for the Cloud: AWS Best PracticesHow AWS Pricing Works Cloud Computing Renting someone's computing power 6 advantages of Cloud Computing Trade Capital Expense for Variable ExpenseDon't have to invest heavily in data centers and servers before... Continue Reading →

Basics of VPNs (Virtual Private Networks)

A VPN or Virtual Private Network is a form of network virtualization commonly used by a remote device in order to simulate being on a private network. This defeats the purpose for enterprises to run costly private lines from one location to another in order for them to be apart of the same private network... Continue Reading →

Basics of Cloud Computing & Security

Abstract In recent years, cloud computing has had a significant impact on technology that businesses are attempting to take full advantage of. This paper will discuss why cloud computing is so desirable by businesses and will also discuss the potential security risks that come with it. Once we understand cloud computing and how it works... Continue Reading →

The POODLE Vulnerability

The POODLE Vulnerability Who is infected? “All systems and applications utilizing the Secure Socket Layer (SSL) 3.0 (also known as SSLv3) with cipher-block chaining (CBC) mode ciphers may be vulnerable. However, the POODLE (Padding Oracle On Downgraded Legacy Encryption) attack demonstrates this vulnerability using web browsers and web servers, which is one of the most... Continue Reading →

Get A Password Manager!

Welcome to the 21st century! Remember back in the day when we would write down a password so we wouldn’t have to memorize it? Well let’s do that again! Just this time we are going to do it better. So a password manager is exactly what it sounds like. It is an application used to... Continue Reading →

What’s an SQL Injection?

SQL Injection What is an SQL injection? URL encoding Types of SQL injections How basic SQL injections work   What is an SQL injection? This code injection technique is used to attack data-driven applications. Attackers can insert SQL statements into an entry field on a vulnerable website for execution. A common reason for using this... Continue Reading →

Understanding Graylog and Log Management

Log Management Tools (Graylog) As you probably know by now keeping track of logs and alerts is a crucial part of security. Therefore, having tools that allows administrators to create an efficient way to manage their logs. The tool we are going to discuss in this post is Graylog, but first let’s look at Log... Continue Reading →

The Metasploit Framework

As I continue gaining experience in my virtual lab and reading of how to conduct countless exploits a tool used in nearly every scenario is Metasploit. I figured it is important to know exactly what this tool is, what it does, how it's made, etc... Choosing and configuring an exploit (code that enters a target... Continue Reading →

Create a website or blog at

Up ↑