Learning Activities for the AWS Security Specialty Course
☆83Apr 11, 2019Updated 6 years ago
Alternatives and similar repositories for la-aws-security_specialty
Users that are interested in la-aws-security_specialty are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automating AWS with Lambda, Python, and Boto3☆209Jul 25, 2023Updated 2 years ago
- Demonstrates sending AWS SecurityHub findings to your email☆14Dec 14, 2018Updated 7 years ago
- Lambda job in Python to automatically patch EC2 instances when an inspector assessment generates a CVE finding☆60Jan 14, 2026Updated 2 months ago
- ☆30Jul 12, 2023Updated 2 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆26Jan 29, 2018Updated 8 years ago
- Deploying to AWS with Ansible and Terraform, Moosa Khalid, 051320☆161Jul 9, 2023Updated 2 years ago
- Michael McClaren, Helm Deep Dive V3, 11-05-2020☆21Jan 27, 2021Updated 5 years ago
- files for AWS DevOps Pro course☆22Nov 18, 2019Updated 6 years ago
- Guffer tweets based on a daily schedule☆12Sep 12, 2018Updated 7 years ago
- Study Notes for AWS DevOps Professional Certification Exam☆31Nov 24, 2018Updated 7 years ago
- Amazon ECS Deep Dive 2018☆56Nov 2, 2023Updated 2 years ago
- Notes for the SCS-C01: AWS Certified Security - Specialty exam.☆14Jun 2, 2024Updated last year
- Apache Airflow - A platform to programmatically author, schedule, and monitor workflows☆11Mar 18, 2026Updated last week
- ☆12Sep 12, 2021Updated 4 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Jun 4, 2025Updated 9 months ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆23Apr 28, 2019Updated 6 years ago
- Tracker for Encryption by Default for AWS Resources☆14Apr 10, 2025Updated 11 months ago
- ☆13Apr 6, 2023Updated 2 years ago
- ☆24Oct 7, 2020Updated 5 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆80Apr 4, 2019Updated 6 years ago
- Pivot into private VPC networks using a VPN connection☆43Oct 8, 2019Updated 6 years ago
- A GIF keyboard for iOS8☆18Oct 8, 2014Updated 11 years ago
- Adrian's AWS CSA Assoc Course Refresh 2019☆220Mar 19, 2022Updated 4 years ago
- AWS learning☆89Dec 3, 2022Updated 3 years ago
- Shell scripts to ease some AWS administration tasks.☆19Aug 31, 2015Updated 10 years ago
- Lecture notes from Linux Foundation's Kubernetes course☆18Nov 26, 2017Updated 8 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- DevSecOps command line asset inventory tool☆30Oct 2, 2023Updated 2 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆34Nov 17, 2018Updated 7 years ago
- Derek's Terraform Course☆73Apr 26, 2019Updated 6 years ago
- Reference Implementations for AWS Well Architected Framework☆15Jul 23, 2018Updated 7 years ago
- ☆14Oct 3, 2018Updated 7 years ago
- ☆12May 8, 2018Updated 7 years ago
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆15Sep 20, 2024Updated last year
- A collection of VS Code Notebooks for gathering context from Cloud Providers (i.e. AWS).☆14Oct 1, 2022Updated 3 years ago
- Squid Proxy + AWS Fargate☆45May 15, 2024Updated last year
- A collection of pen-testing/hacking scripts. Various uses.☆13Oct 24, 2020Updated 5 years ago
- defendA Data Lake. A firehose pipeline to athena providing enrichment and normalization for security events☆17Apr 19, 2023Updated 2 years ago